Wednesday, 23 August 2017 15:48
We are pleased to announce that Computit is now QAssure certified and GITC accredited company.
Holding QAssure and GITC accreditations makes us eligible for government buyers who are searching for accredited suppliers.
QAssure accreditation is for ICT suppliers to be considered for Queensland Government work managed by CCIQ – Queensland’s peak business body – and the Queensland Government.
GITC accreditation is an agreement by suppliers to use the GITC Framework terms and conditions managed by the Department of Science, Information Technology and Innovation
Both GITC and QAssure accreditations are not given without considerable checks and balances. Only ICT suppliers that are credible and fit for purpose are accredited. We are selected as one of the best ICT suppliers in Queensland.
Verification of valid GITC accreditation for Computit Pty Ltd can be viewed on the QAssure website at www.qassure.com.au
Thursday, 17 August 2017 12:00
Office 365 users are now being targeted in a pretty convincing looking phishing attack.
Phishing attacks, a common tactic used by cyber criminals to try to trick you into giving them your information, are nothing new. In fact, it's likely if your company has already been targeted by phishing (and if you haven't been, it's a matter of when - not if) and it's getting harder and harder to spot the malicious emails.
The email appears to be an automated alert email from Microsoft saying the user's Office 365 account has been suspended and asks them to sign in to reactivate your account. While the email does look realistic, there are some major red flags. Let's take a look:
Friday, 11 March 2016 14:55
Gone were the days when to start-up anything new was similar to gambling, either you win or lose because, of lack of enough information and not able to predict what will be the possible outcome. But, now-a-days we are living in the era of technology; everyone tries to gather as much as possible information on Internet and that comes from websites and web pages. If a business is not having a website it cannot dream of flying high as it is invisible on web. Websites have a huge impact on the sales of a business. Here are some reasons why having a good website is mandatory:
Visual Presentation: We easily remember what we see. 90% of human brain power to understand things depends on what is visible to eyes. A website with good design caught the attention of customers.
Fly High & Always Available: Business cards can be seen by people only whom you give it to or people who pick it up from your business. Whereas, a website can be accessed anywhere on the planet 24/7 with an internet connection.
Easily Updated: Information on a business card cannot be updated until it is not printed again and it is limited to its size too. On the other hand a website is not limited to size and the information can be edited, any time.
Customer relations: On a website customers can give feedback on your products. Customer support can be provided through website, it strengthens the seller-customer relationship. This is an excellent way to have better understanding of the customer’s needs and to access what areas need to be improved.
Wednesday, 25 February 2015 00:00
This sounds like the title of a children’s book, but unfortunately the issue highlighted in the press this week is more concerning than a story. The pre-loading of the SuperFish software on the Lenovo machines introduced a vulnerability to users even before they unboxed their new laptop.
There are several issues with the pre-installed application, one is that it is an ad-injector which inserts adverts into your browser based on what you are searching for, and without being an expert at identifying these you might be directed to sites to purchase things without understanding why.
To do this more effectively, Superfish also installs a root certificate which allows them to see traffic on encrypted websites, like your banking website, that you might have considered private and secure.
This is a bit like me giving out the keys to your house and could be abused by other malicious people and used to capture passwords and other personal information.
AVG detects and removes the Superfish add-on. If you have attempted to download something it was bundled with then AVG would have detected and blocked it advising the user it was an ‘unwanted application’ and potentially harmful.
This means no part of it was ever installed – good for existing AVG users, but what about if you have purchased a Lenovo and then installed an anti-virus product, the risk here is that full removal of some parts are difficult to remove as they are embedded into the system.
This week Lenovo has been re-active to this anddeveloped a removal tool which you can download here. There are also manual instructions available should you want to do this yourself.
There is a much wider issue for consumers though, it’s becoming very difficult to know which products and manufacturers to trust and who is doing what with our data.
There are discussions in the tech industry on improving transparency so that consumers can once again have confidence in brands.
I believe that over the next few months we will see progress in a more coordinated effort by the security industry to protect users from these types of applications.
If you are at all concerned then be sure to run a full system scan from you Anti-Virus product and ensure that the updates have been run. If you’re running an expired product then either renew it or download the AVG AntiVirus Free solution here.
Wednesday, 25 February 2015 00:00
We’ve still got nearly two weeks to go before HTC officially unveils their new top-tier Android phone at Mobile World Congress, but it looks like the details have already started dumping out.
On an episode of Droidcast back in January, we were pretty confident that HTC’s next big device — which we tentatively called the HTC One M9 — would look a whole lot like its HTC’slast flagship, the One M8.
Sure enough: if these latest leaks are legit, it’s pretty much a dead ringer. They’ve moved some buttons around, sure, and it looks like they’ve gone from two cameras on the rear to one — but unless you really know your stuff, a quick glance would leave you thinking the two devices were one in the same.
Note that third button below the pair of volume buttons on the right. That’s the power button, which on the One M8 was located on the top of the device. Given how damned big the One M8 is, having the power button up top made it a bit arduous to reach at times.
Meanwhile, Germany’s MobileGeeks.de found some official-looking renders lurking on a German phone retailer site, though the page has since been gutted of most of its imagery.
Here’s what the rumor mill suggests is under the hood:
• 5-inch Display running at 1080p
• 20.7 Megapixel rear camera, 4.0 megapixel front camera with HTC’s “Ultrapixel” tech
• Android Lollipop 5.0 (with some HTC Sense stuff running on top)
• 2,840mAh battery
• 3GB of RAM
• 2Ghz Qualcomm Snapdragon 810 CPU (though some rumors pin it at 2.8Ghz)
Everything is still up in the air for now, of course. Even the name is still up for debate; some say it’s the “One M9″, some say it’s just “The One”. Whatever the case, HTC should be making things 100% official come March 1st in Barcelona.
Wednesday, 25 February 2015 00:00
Android phones can be tracked without using their GPS or wi-fi data by studying their power use over time, a study has found.
A smartphone uses more power the further away it is from a cellular base and the more obstacles are in its way as it reaches for a signal.
Additional power use by other activities could be factored out with algorithms, the researchers found.
They created an app designed to collect data about power consumption.
"The malicious app has neither permission to access the GPS nor other location providers (eg cellular or wi-fi network)," the team - Yan Michalevsky, Dan Boneh and Aaron Schulman, from the computer science department at Stanford University, along with Gabi Nakibly, from Rafael Ltd - wrote in their paper.
"We only assume permission for network connectivity and access to the power data.
"These are very common permissions for an application, and are unlikely to raise suspicion on the part of the victim."
There are 179 apps currently available on Android app store Google Play that request this information, the team add.
Activity such as listening to music, activating maps, taking voice calls or using social media all drain the battery but this can be discounted due to "machine learning", the report says.
"Intuitively the reason why all this noise does not mislead our algorithms is that the noise is not correlated with the phone's location," it says.
"Therefore a sufficiently long power measurement (several minutes) enables the learning algorithm to 'see' through the noise."
The tests were carried out on phones using the 3G network but did not measure signal strength as that data is protected by the device.
'Stuffed with sensors'
"With mobile devices now becoming ubiquitous, it is troubling that we are seeing so many ways in which they can be used to track us," said cyber-security expert Prof Alan Woodward, from Surrey University.
"I think people sometimes forget that smartphones are stuffed full of sensors from gyroscopes and GPS to the more obvious microphones and cameras.
"This latest work shows that even that basic characteristics (power consumption) has the potential to invade privacy if monitored in the right way," he added.
"We are approaching the point where the only safe way to use your phone is to pull the battery out - and not all phones let you do that."