Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Author Archives: Emmanuel Carabott

Secure SHell (SSH): making life easier

Secure SHell (SSH): making life easier

on May 4, 2010

SSH is a very useful tool for anyone using Linux Environments. It’s a secure way to log into a machine remotely but can also do a lot more. With SSH one can create tunnels –  that is have the local …

Read the Full Story
0
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 3)

Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 3)

on April 6, 2010

This is the final segment in this three-part series where we have looked at the importance of security within an organization; the different types of attacks that could occur and the motivation behind these attacks. What should one do? This …

Read the Full Story
2
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 2)

Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 2)

In the first part of this series we discussed the different security attacks that a business needs to protect against. What about motivation? Why would anyone attack my business? Financial motivation is the most obvious reason. The attacker simply wants …

Read the Full Story
0
Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 1)

Security: Is it really necessary? Does it justify the cost? Or is it all FUD? (Pt. 1)

Security is a tricky subject; you get people who push for security and other who claim that it is all a waste of money. What is the truth? Is security really worth the investment? Will organizations get something in return …

Read the Full Story
1
Trust: Security, the enemy of Security

Trust: Security, the enemy of Security

on March 5, 2010

In the previous posts about Trust I outlined how things that are designed to help you with your security can sometimes hinder that very security that you are trying to achieve. Today I will take that even further and outline …

Read the Full Story
0
Spying – the new black?

Spying – the new black?

on February 19, 2010

Today I came across a very disturbing story by Mike Masnick at techdirt. Mike reports about a class action suit by some students who claim the school was monitoring them through the webcam from laptops they were issued by said …

Read the Full Story
7
How Secure can Security be?

How Secure can Security be?

on February 17, 2010

Today I came across a series of articles that claims that most solutions that encrypt voice communications on mobile phones are not up to par and can easily be intercepted. My first reaction was that this was a very bold …

Read the Full Story
3
Shell’s Data Breach: A Security Spill?

Shell’s Data Breach: A Security Spill?

on February 15, 2010

This week the BBC reported that someone has disclosed contact details for 170,000 of Shell’s employees world wide. The disclosure comes with a note claiming it is being disclosed by former employees who can’t stand the damage the company is …

Read the Full Story
4
Trust – Certifications

Trust – Certifications

on January 19, 2010

Recently I wrote an article about how Trust can be a security risk in one’s environment; today I will expand on that further. On the 4th of January H-Online  reported a story where security firm SySS managed to get around …

Read the Full Story
5
Internet Explorer 0Day Vulnerability: The Aurora Exploit

Internet Explorer 0Day Vulnerability: The Aurora Exploit

on January 18, 2010

In the modern age vulnerabilities are discovered in one of two ways; organizations, researcher, testers and white hats test applications for vulnerabilities due to their line of work or simply to build a reputation. Once these individuals find vulnerabilities they …

Read the Full Story
1