Recent stories

At what age should your child have their own smartphone or tablet device?

At what age should your child have their own smartphone or tablet device?

The answer, according to a new survey, is 10.6 years. According to the Trend Micro Australian Children & Mobile Device Survey, 63% of children aged between  8 and 11 and 73% of children aged between 12 and 15 either have their own mobile device or use their parent’s mobile devices. It will come as no surprise that the survey discovered that[Read More...]

ASUS offers new price conscious android tablet

ASUS offers new price conscious android tablet

If you think a 10 inch tablet device is a bit cumbersome to get about with then you’ll find there’s a great range of 7-inch devices on market that fill the gap between full size tablet and smartphone nicely. One of the latest offering in this category is the MeMO Pad 7 from ASUS.   Along with a new Intel quad[Read More...]

Friday Play – Cannon Penguins

Friday Play – Cannon Penguins

Today I’ve found something fun for you to play on your Android Mobile device.  The game is ‘Cannon Penguins’ and before I go on I should say that yes you can hand this to the kids as it’s also somewhat educational. Now as you might expect, in this game you control a cannon that fires penguins with the aim to[Read More...]

Clean that dirty Computer Keyboard

Clean that dirty Computer Keyboard

Do you eat at or around your computer? If so your computer keyboard is probably full of all sorts of muck and will be due for a good clean out. For starters, turn your computer off, unplug the keyboard and turn it unside down giving it a gentle tap…you may be surprised to see exactly how much dust, crumbs, hair[Read More...]

Cross-platform attacks threaten all your devices

Cross-platform attacks threaten all your devices

Cyber-criminals are now finding ways to infiltrate and infect every single online device you own. In their latest mobile report, Trend Micro reveals some recent examples of mobile apps that are not only capable of stealing information from infected mobile devices but which can then deliver a secondary malicious payload onto a PC connected to that device. Some examples; ANDROIDOS_USBATTACK.A,[Read More...]