Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Search Results for: google play


26 Ways to Say ‘Happy SysAdmin Day!’

26 Ways to Say ‘Happy SysAdmin Day!’

on July 25, 2013

Around the world and across the Internet, July 26 is known as SysAdmin Day. For 14 years, the last Friday in July has been set aside as a way for users to show a little appreciation for the SysAdmins that …

Read the Full Story
2
The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins

The Top 20 Free Network Monitoring and Analysis Tools for Sys Admins

on July 23, 2013

We know how administrators love free tools that make their life easier and, to supplement the list provided on 101 Free Admin Tools, here are 20 of the best free tools for monitoring devices, services, ports or protocols and analysing …

Read the Full Story
2
The 41 Dumbest Security Decisions

The 41 Dumbest Security Decisions

on April 22, 2013

Have you ever been confronted by a decision that seemed so ill-advised or just plain wrong that you couldn’t believe anyone would make it? Has that been something either directly related to, or impacting security? If so, then there’s probably …

Read the Full Story
4
What the hack?

What the hack?

on March 1, 2013

The past few months have been characterised by a number of high-profile hack attacks. What the hack is going on? (Pardon the pun!) Quite a few things actually:

Read the Full Story
0
Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It

Eight Stealth IT Technologies that Can Cause You Problems, and 10 Things You Can Do About It

on February 27, 2013

As I was flying home from a customer engagement, I looked down from the window of the airplane to see all the clouds floating lazily below me. It was not a completely overcast day, so I could easily see the …

Read the Full Story
0
Report: The Most Vulnerable Operating Systems and Applications in 2012

Report: The Most Vulnerable Operating Systems and Applications in 2012

on February 5, 2013

Vulnerabilities in software and operating systems remain a thorn in the side for administrators around the world. A single vulnerability exploited by the bad guys can bring a company to its knees. Maintaining patched systems is a must in today’s …

Read the Full Story
3
Fake Adobe Flash Updates Resurface on the Web

Fake Adobe Flash Updates Resurface on the Web

on January 24, 2013

Following the return of fake Google Chrome browser updates almost two weeks ago, online criminals are now banking on fake Adobe Flash Player updates to lure the unwary user into downloading malware onto their system. Matthew and Robert, two of our …

Read the Full Story
2
2013 Through the Crystal Ball

2013 Through the Crystal Ball

on December 28, 2012

Predicting the future is one hazardous occupation (ask the Mayans), yet in the world of IT and technology, trends and habits have a tendency to repeat themselves year after year. In this post we look at some of the things …

Read the Full Story
0
Profile Spy Resurrects on Eve of Mayan Apocalypse

Profile Spy Resurrects on Eve of Mayan Apocalypse

on December 21, 2012

Ah, Profile Spy, a once viral scam on Facebook and Twitter that entices users to check out who have been viewing their profiles. Today, on the eve of the rumored EoW, it has decided to rear its ugly head once more. …

Read the Full Story
1
GFI Labs’ Top Stories of 2012

GFI Labs’ Top Stories of 2012

on December 17, 2012

2012 has been an interesting year not only for the security industry but also across other industries that touch on information, technology, gaming and anything social online. We have seen big feats, victories and oftentimes some failings we can only …

Read the Full Story
0