Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Debra Littlejohn Shinder

About Debra Littlejohn Shinder

Debra Littlejohn Shinder has been working and writing in the field of IT security since 1998. She’s an author of and contributor to over 25 books on computer technology, including “Scene of the Cybercrime,” based on her previous experience as a police officer and police academy instructor. Deb is owner and CEO of TACteam and has contracted with Microsoft, Intel, HP, Prowess Consulting, Sunbelt Software, GFI Software, ConfigureSoft, 2X Software and other software and hardware companies. She currently writes articles and blogs for Windowsecurity.com, WindowsNetworking.com and ISAserver.org and has published more than 1500 articles for web sites and print magazines. Deb has been a Microsoft MVP in the area of enterprise security for the past ten years.

A tale of two security approaches – and why you need both

A tale of two security approaches – and why you need both

on April 16, 2014

Once upon a time, attacks on computers and networks were relatively simple. Our primary worry was viruses and their variants – worms, Trojans, rootkits. Their authors set out with malicious intent, to create software that can cause harm by shutting …

Read the Full Story
0
New vulnerability makes your Heartbleed

New vulnerability makes your Heartbleed

on April 11, 2014

This week’s big news on the security front is all about Heartbleed, a vulnerability in OpenSSL, which is used by many web sites to encrypt transmissions between the machines of users who visit their sites and the web servers. The …

Read the Full Story
2
Is your work environment making you a more (or less) productive worker?

Is your work environment making you a more (or less) productive worker?

on April 9, 2014

We all know that a “hostile work environment” is bad for employees and for the company, in many ways. But what about a down right boring work environment? Some employers prohibit employees from engaging in “extracurricular” activities while working – …

Read the Full Story
0
April 2014 Patch Tuesday roundup

April 2014 Patch Tuesday roundup

Time flies when you’re having fun, and we must be having a wonderful time because Patch Tuesday is here again already. The good news is that, as noted in our advance notification blog post, it’s another light one, with only …

Read the Full Story
0
Legal or not, Google’s collection of Wi-Fi data is unacceptable

Legal or not, Google’s collection of Wi-Fi data is unacceptable

on April 8, 2014

It caused quite a stir back in 2010 when Google first admitted to collecting data from personal Wi-Fi networks all over the United States via their Street View cars. Although it had been going on since 2007, the company said …

Read the Full Story
0
April Advance Notification: No deluge this month

April Advance Notification: No deluge this month

on April 4, 2014

Microsoft had better watch out; IT professionals are going to get spoiled and lazy if this keeps up. Thus far, 2014 has brought us a light workload every month when it comes to patching time, and the trend continues in …

Read the Full Story
0
Third-party patch and vulnerability roundup – March 2014

Third-party patch and vulnerability roundup – March 2014

on March 28, 2014

There’s an old saying that March comes in like a lion and goes out like a lamb. At first glance, one would think this month went out pretty gently – but things are not always as they seem. Although the …

Read the Full Story
0
Manic Monday: Zero day vulnerability targeting Microsoft Word

Manic Monday: Zero day vulnerability targeting Microsoft Word

on March 26, 2014

On Monday of this week, Microsoft released an “out of band” security advisory regarding a serious vulnerability in all supported versions of Microsoft Word that is already being exploited in the wild. There are several ways a computer user could …

Read the Full Story
0
Wearable computing: How will it change business and society?

Wearable computing: How will it change business and society?

The tech industry has been talking about it for decades: the personal area network (PAN) and wearable computing. It’s the logical outgrowth of the smart phone craze – computing devices that you attach to your body (or even, in extreme …

Read the Full Story
0
Nobody’s safe: Big companies’ websites inadvertently spreading malware

Nobody’s safe: Big companies’ websites inadvertently spreading malware

on March 24, 2014

If you don’t speak/read Dutch, here’s a malware story that you might have missed: ConsuWijzer, which is a consumer advice web site run by the government in the Netherlands, advised last week that a large scale malware campaign was spreading …

Read the Full Story
0
 
  • TalkTechToMe
  • TalkTechToMe TV
  • GFI Patch Central - Patch updates made easy