Identify fake notifications
Fake update notifications can easily trick even cyber savvy users and infect their devices with malware. This is …Identify fake notifications
Welcome to our tech blog, your ultimate guide to all things geeky. From tech tips and how-to guides to cybersecurity advice and tech reviews, you'll find everything you need to enhance your tech knowledge.
Fake update notifications can easily trick even cyber savvy users and infect their devices with malware. This is …Identify fake notifications
Cyber crime has been on the rise in the UK for some time, but the 2020 coronavirus pandemic …Top 5 Industries Vulnerable To Cyber Attack
Online censorship is a big issue nowadays and it may become an even greater one going forward. As …Guide to Online Censorship
In short, a proxy is basically another computer that stands between your own computer and the destination site. …Why use a Proxy?
Geekheads are your local London IT Support company. What happens when you partner with Geekheads? 1. Setup – …London’s Trusted IT Support Team
How does a password manager store your data? What is a password manager? A password manager is a …How do password managers work?
How to enable your wireless router’s built-in firewall? About firewalls A firewall polices your network, it can be …Enable Router Firewall
Adjusting your security settings for each of your email accounts is a must, but don’t stop there if …Keep Email Safe
My account was hacked. Now what? These are the critical steps you should take if you discover that …My account was hacked
If you have children, we hope they never experience cyberbullying. But it’s a harsh reality and a type …Cyberbully Protection
If you don’t work in the cyber security industry, some terms may as well be part of another …Cyber Security Glossary
Now that Pokemon Go exploded and turned into a worldwide phenomenon, we start to realise the new threats …Augmented Reality
Small chip, huge leap, here’s why… What is the M1 chip, and what does it do? It offers …Apple M1 Chip
Virtual machines (VM) have become a fixture of many business networks, thanks to their flexibility and cost-effectiveness. But …Why Use a VM?
When it comes to the ones we love, there’s nothing we wouldn’t do to protect them. Here’s a …Block Trackers
IEEE 802.11ax, marketed as Wi-Fi 6 by the Wi-Fi Alliance, is a Wi-Fi specification standard, and the successor …What’s Wi-Fi 6?
Did you know that Google saves a recording of your voice and other audio to your Google Account? …Manage Google Voice
What is a Botnet & How to prevent your PC from being enslaved? Has your computer been acting …What is a Botnet?