Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Emmanuel Carabott

The Spy Storm

The Spy Storm

on December 20, 2013

I am very careful when writing about security. There is a fine line between an objective discussion on security and engaging in what we often term “FUD” – fear, uncertainty and doubt.

Read the Full Story
0
How to Avoid Becoming the Villain (Part 2)

How to Avoid Becoming the Villain (Part 2)

on July 9, 2013

Life is full of surprises. I recently wrote an article titled How to Avoid Becoming the Villain on why it is so important to configure your servers correctly so that people cannot exploit them for illegal purposes. A few days …

Read the Full Story
0
Education is Your Only Defence against Shoulder Surfing

Education is Your Only Defence against Shoulder Surfing

on July 4, 2013

All the technology products in the world will never protect you against shoulder surfing. Shoulder surfing occurs when someone overhears or sees another person entering their credentials into a system and learns what they are. It has happened to most …

Read the Full Story
0
The Hidden Security Threat

The Hidden Security Threat

on May 29, 2013

Although not all stories in the tech press are directly related to security, they often highlight issues that can be excellent educational material. A recent story in The Register about a researcher who wanted to map the Internet caught my …

Read the Full Story
0
Using pirated software? Swashbuckling with risk!

Using pirated software? Swashbuckling with risk!

on April 24, 2013

We are often warned about the security risks when using pirated software. While some believe the ‘piracy argument’ is pushed by vendors to scare people into buying software rather than pirating it, this statement is not incorrect.

Read the Full Story
0
How to Avoid Becoming the Villain

How to Avoid Becoming the Villain

on April 19, 2013

Computing history has shown us that if you are running servers you are responsible for your own infrastructure and in some cases, also responsible towards those using the Internet. Malicious attacks illegally exploiting poorly configured servers were common practice until …

Read the Full Story
0
Spyware: The Next Generation

Spyware: The Next Generation

on November 2, 2012

The world of IT continually creates new technologies and malicious software develops along with it. As we become more reliant on devices such as mobile phones, consoles and tablets, it is just a matter of time before hackers begin to …

Read the Full Story
0
Unsolicited Phone Call Scams – Part Two

Unsolicited Phone Call Scams – Part Two

on October 23, 2012

In Part One, I talk about a phone call scam I received and how I had been passed by the “caller” to a “supervisor”, and then to a “technician”, and how the story just got better and more believable along …

Read the Full Story
2
Unsolicited Phone Call Scams – Part One

Unsolicited Phone Call Scams – Part One

on October 15, 2012

Phone call scams are becoming an epidemic. The phone rings and, upon answering, the caller promptly identifies himself/herself and often claims to work with a prominent organization, such as Microsoft – all of which is bogus. However, some of the …

Read the Full Story
0
Windows Server 2012 – An Overview

Windows Server 2012 – An Overview

on September 14, 2012

Windows Server 2012, the latest addition to the Microsoft Server operating system line up, was launched recently and with all the hype I just had to give it a spin.  In most cases, changes to server operating systems are hidden …

Read the Full Story
3