Web Browsing stories - Page 3
![Story image](../../../../../uploads/story/2020/04/16/preview_GettyImages-488437074.webp)
Cybercriminals most likely to impersonate Apple, Netflix in phishing attacks
Thu, 16th Apr 2020
#
phishing
#
email security
#
brand exploitation
Cybercriminals are increasingly impersonating major tech companies like Apple, Netflix, and WhatsApp in phishing attacks, warns Check Point’s Q1 2020 report.
![Story image](../../../../../uploads/story/2020/02/25/preview_browser_security.webp)
McAfee announces new acquisition as it moves toward browser isolation
Tue, 25th Feb 2020
#
saas
#
casb
#
dlp
The acquisition of Light Point Securitywill supplement McAfee’s existing inbound and outbound protection for all web and cloud traffic, according to McAffee.
![Story image](../../../../../uploads/story/2019/11/14/preview_Apple_16-inch-MacBook-Pro_111319.webp)
Apple rolls out the 2019 MacBook Pro
Thu, 14th Nov 2019
#
personal computing devices
#
apple
#
mobility
Flex your fingers, Apple MacBook fans - because it’s time for the 2019 iteration of the famed notebook line that never dies.
![Story image](../../../../../uploads/story/2019/09/09/preview_ipad_air_correct.webp)
Hands-on review: The middle-of-the-road 2019 iPad Air
Mon, 9th Sep 2019
#
gaming
#
reviews
#
digital entertainment
Apple's 2019 iPad Air falls squarely in the middle of the workhorse iPad Pro and the entry-level iPad in terms of price point and specification.
![Story image](../../../../../uploads/story/2019/06/13/preview_GettyImages-1051185114.webp)
NZ's broadband is reliable enough to stream video, says ComCom study
Thu, 13th Jun 2019
#
uc
#
wireless networks
#
cloud services
New Zealand’s broadband services are holding their own when it comes to deliver video streaming services like Netflix and YouTube.
![Story image](../../../../../uploads/story/2019/05/29/preview_ipod.webp)
The world thought the iPod touch was dead: 'Nope', says Apple
Wed, 29th May 2019
#
personal computing devices
#
apple
#
ipod
It has been four years since Apple released the 6th generation iPod touch, so clearly Apple thinks there’s still life in the iPod yet.
![Story image](../../../../../uploads/story/2019/03/21/preview_Memory_01.webp)
Five signs it may be time for a memory upgrade
Thu, 21st Mar 2019
#
personal computing devices
#
pc hardware
#
crucial
Tired of slow typing, lagging tabs, and choppy videos? Consider upgrading your PC's RAM. Here are five signs it's time for a memory boost.
![Story image](../../../../../uploads/story/2018/08/29/preview_ThinkstockPhotos-582277162.webp)
Intel adds U and Y series to 8th gen family
Wed, 29th Aug 2018
#
endpoint protection
#
edr
#
wireless networks
They are designed for maximum connectivity speeds and come with a range of upgrades to suit modern requirements.
![Story image](../../../../../uploads/story/2018/05/22/preview_Screen_Shot_2018-05-22_at_11.webp)
Data from app that enables parents to monitor teen’s phone activity leaked
Tue, 22nd May 2018
#
cybersecurity
#
data leak
#
winmagic
How ironic! Tens of thousands of user accounts of an app used by parents to monitor their children’s phone activity has been leaked.
![Story image](../../../../../uploads/story/2018/03/29/preview_AI.webp)
NEC and NICT use AI to optimize the allocation of network resources
Thu, 29th Mar 2018
#
digital signage
#
displays & projectors
#
ai
NEC and NICT have harnessed AI to efficiently classify network traffic, promising a significant improvement in the allocation of network resources.
![Story image](../../../../../uploads/story/2018/03/13/preview_coding.webp)
Anti-tracking browser extension Ghostery goes open source
Tue, 13th Mar 2018
#
open source
#
data privacy
#
cybersecurity
Ghostery, a free web browsing software, has announced that its code is now publicly available on GitHub as the company goes open source.
![Story image](../../../../../uploads/story/2018/02/19/preview_ThinkstockPhotos-641517852.webp)
United States hot on heels of North Korea's Hidden Cobra malware
Mon, 19th Feb 2018
#
malware
#
ddos
#
cybersecurity
The United States Computer Emergency Readiness Team (US-CERT) is honing in on the North Korean Government’s activities known as HIDDEN COBRA.
![Story image](../../../../../uploads/story/2018/01/08/preview_MAcOs.webp)
Apple confirms that macOS and iOS are vulnerable to Meltdown bugs
Mon, 8th Jan 2018
#
smartphones
#
personal computing devices
#
ios
Security issues known as Meltdown and Spectre affect all modern processors, including Apple's Mac systems and iOS devices. No known exploits at this time.
![Story image](../../../../../uploads/story/2017/12/13/preview_ThinkstockPhotos-877076702.webp)
Menlo Security closes $40m funding round to expand malware isolation tech
Wed, 13th Dec 2017
#
malware
#
cybersecurity
#
healthtech
Menlo Security has successfully closed a Series C funding round to the tune of US$40 million this week, bringing its total funding to $85 million.
![Story image](../../../../../uploads/story/2017/11/16/preview_ThinkstockPhotos-823686906.webp)
Mobile security starts with a powerful AI-based scanning engine
Fri, 17th Nov 2017
#
smartphones
#
wireless networks
#
ai
This principal analyst from Camden Associates says the secret sauce to securing mobile users is AI-based zero packet inspection.
![Story image](../../../../../uploads/story/2017/10/09/preview_ThinkstockPhotos-488474266.webp)
Kiwis get ready to Wi-Fly: Air New Zealand trials in-flight Wi-Fi
Mon, 9th Oct 2017
#
uc
#
martech
#
wireless networks
Air New Zealand begins the trial of its in-flight Wi-Fi service on one of its long-haul Boeing 777-300 aircraft.
![Story image](../../../../../uploads/story/2017/09/12/preview_Image-Manifesto_4usW0ot.webp)
Spark launches rollover data & minutes for all customers
Tue, 12th Sep 2017
#
uc
#
telco
#
mobile data
Spark unveils new rollover plans, allowing customers to save up to 3.5GB data and 500 minutes for a full year but prompts a switch to new plans.
![Story image](../../../../../uploads/story/2017/08/09/preview_Targeting_cyber_threats.webp)
Cybercrime: What to expect for the rest of 2017 and how to prepare
Wed, 9th Aug 2017
#
malware
#
ddos
#
vpns
So far this year we have already borne witness to a multitude of serious cybercrime. NordVPN has provided insights for what the second half may hold.
![Story image](../../../../../uploads/story/2017/07/18/preview_ThinkstockPhotos-812847840.webp)
To pay or not to pay; protecting your business against the rising threat of ransomware
Tue, 18th Jul 2017
#
malware
#
dr
#
ransomware
f you think you’d elect to pay, there’s no better time than now to improve your security practices as you will become a target for further attacks.
![Story image](../../../../../uploads/story/2017/07/18/preview_ThinkstockPhotos-653938390.webp)
Threat actors embrace metadata as the underrated weapon in cyber war
Tue, 18th Jul 2017
#
data analytics
#
martech
#
planning
Metadata – the data that describes other data – is a security threat that goes underreported but is also a powerful threat to national security.