Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

Why spamming is an easy business – and the problems it causes

Why spamming is an easy business – and the problems it causes

on March 16, 2010

Recently, whilst searching for a particular solution on the Internet, I encountered the following post in a forum: Surely, not the solution I was looking for. However, the post is strange and did catch my attention. Apart from the broken …

Read the Full Story
2
Trust: Security, the enemy of Security

Trust: Security, the enemy of Security

on March 5, 2010

In the previous posts about Trust I outlined how things that are designed to help you with your security can sometimes hinder that very security that you are trying to achieve. Today I will take that even further and outline …

Read the Full Story
0
Spying – the new black?

Spying – the new black?

on February 19, 2010

Today I came across a very disturbing story by Mike Masnick at techdirt. Mike reports about a class action suit by some students who claim the school was monitoring them through the webcam from laptops they were issued by said …

Read the Full Story
7
How Secure can Security be?

How Secure can Security be?

on February 17, 2010

Today I came across a series of articles that claims that most solutions that encrypt voice communications on mobile phones are not up to par and can easily be intercepted. My first reaction was that this was a very bold …

Read the Full Story
3
Shell’s Data Breach: A Security Spill?

Shell’s Data Breach: A Security Spill?

on February 15, 2010

This week the BBC reported that someone has disclosed contact details for 170,000 of Shell’s employees world wide. The disclosure comes with a note claiming it is being disclosed by former employees who can’t stand the damage the company is …

Read the Full Story
4
Trust – Certifications

Trust – Certifications

on January 19, 2010

Recently I wrote an article about how Trust can be a security risk in one’s environment; today I will expand on that further. On the 4th of January H-Online  reported a story where security firm SySS managed to get around …

Read the Full Story
5
Internet Explorer 0Day Vulnerability: The Aurora Exploit

Internet Explorer 0Day Vulnerability: The Aurora Exploit

on January 18, 2010

In the modern age vulnerabilities are discovered in one of two ways; organizations, researcher, testers and white hats test applications for vulnerabilities due to their line of work or simply to build a reputation. Once these individuals find vulnerabilities they …

Read the Full Story
1
How to handle security

How to handle security

on January 14, 2010

I’ve previously discussed how important it is to pay attention to the medium you’re using; transferring data via satellite for example puts you at great risk as you’re spreading your data on a wide geographical range, in most cases unencrypted. Everyone …

Read the Full Story
0
The Threats of Steganography

The Threats of Steganography

on January 11, 2010

Steganography is the art of concealing messages into something innocuous in such a way that it is extremely difficult for someone to suspect, let alone find, a hidden message. The etymology of the word “steganography” comes from the Greek language …

Read the Full Story
1
Trust – The Enemy of Security?

Trust – The Enemy of Security?

on January 6, 2010

Some time ago I was reading about the Counterfeit banknote detector pen.  This pen basically writes in yellow on genuine money but in black or grey on fake money. So I thought, great but doesn’t that mean that if a …

Read the Full Story
2