Blog

Featured Article : Pros and Cons of Weakening Encryption

With the Online Safety Bill threatening to undermine end-to-end encryption, we look at the strengths and weaknesses of this security trade-off. 

Encryption 

Encryption comes from the science of cryptography. In today’s digital world, encryption refers to using electronic devices to generate unique encryption algorithms which essentially scramble...

Read more

Tech News : Google Improves ‘Quoted Search’

Google has made it easier to do quoted searches by adding snippets to search results to help users save time in locating a phrase in a web page. 

Quoted Searches 

Quoted Searches are searches where the search term is placed within quotation marks to find an exact...

Read more

Tech Insight : What is GitHub, GitLab Etc?

In this insight, we take a look at what GitHub and GitLab are, and why they are important in the world of software development. 

GitHub, from GitHub Inc., is a not-for-profit website and cloud-based hosting service for open-source development projects – it is the largest open-source host. It helps developers,...

Read more

Security Stop-Press : GitHub Users Targeted With Malicious Copies Of Repositories

Cyber security researchers have warned that GitHub users are being targeted with similarly named but malicious copies (containing malicious code) of legitimate repositories. The copied repositories are designed to siphon user environment variables, steal API keys, tokens, crypto keys, and execute arbitrary code on affected endpoints. The advice to developers / GitHub users...

Read more

Share Buttons
Hide Buttons