Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

Category Archives: Tech Zone

Technical info for IT professional and network administrators.

21st Century Heists – Part 3

21st Century Heists – Part 3

on July 3, 2009

After previously taking a look at the various methods employed to steal money the hi-tech way, below are some considerations, tips and closing thoughts about how to avoid becoming a victim to these schemes. Nowadays a robbery is no longer …

Read the Full Story
0
21st Century Heists – Part 2

21st Century Heists – Part 2

on July 2, 2009

We previously discussed how robberies and theft used to be carried out in the past and how this has evolved in time. Now we will continue discussing modern ways that malicious people have employed in order to steal money. Skimming …

Read the Full Story
0
21st Century Heists – Part 1

21st Century Heists – Part 1

on July 1, 2009

The world is evolving. Remember a time when to make a phone call meant having to find the closest pay phone or going home to a landline?  How about a time when there was no such thing as a television? …

Read the Full Story
0
Fake Update for Microsoft Outlook/Outlook Express (KB910721)

Fake Update for Microsoft Outlook/Outlook Express (KB910721)

on June 26, 2009

On the 22nd June I posted about the importance of securing the human element in an organization, and in that same week, the universe, or more correctly cyberspace, decided to provide a real world example of some of the points that …

Read the Full Story
5
Securing an IT Infrastructure

Securing an IT Infrastructure

on June 24, 2009

Security is a very broad subject and unfortunately one that doesn’t deal in absolutes.  There is no magic pill, no consultant who can tell you just use this and you’ll be totally secure, and if they do, then they’re not …

Read the Full Story
1
Security: The Human Element

Security: The Human Element

on June 22, 2009

One aspect of security that is often overlooked is the Human Element. People are a factor in IT infrastructure and as such are also a possible attack vector. Business organizations should take this aspect of security as seriously as any …

Read the Full Story
0
Computer Security in the News

Computer Security in the News

on June 15, 2009

Viruses, Trojans, worms, spyware, malware, rootkits, phishing, botnets, cross-site scripting, vulnerabilities… the list of buzzwords goes on. These words all mean something to us in the security arena, but for the general public they’re just  indistinguishable words that geeks use. …

Read the Full Story
0
The current and future SPAM storms

The current and future SPAM storms

You may already be familiar with SPAM emails that contain just one sentence about weight loss; Oprah and the infamous Acai berries. What is interesting about this current spam storm is that the spammer did not try to bypass any anti-spam filtering technologies. Surely, most products would have filtered such email as spam. Hence, the question to pose is ‘What is the aim of such spam?’

Read the Full Story
0
Taking Security Seriously

Taking Security Seriously

In today’s world one can claim that nearly any organization to operate needs an IT infrastructure. It can be a simple system such as a basic point of sale for a small corner shop to a full fledged IT infrastructure working across continents joining international organizations into one cohesive structure. All systems, be it the smallest up to the largest have one thing in common, they all want to simply get the job done.

Read the Full Story
3
Conficker, at the airbase and hospital near you…

Conficker, at the airbase and hospital near you…

Old news: Fighter jets grounded, base infected with Conficker! Recent news: Hospital equipment infected by Conficker worm! What? How can a supposedly secure environment like a military installation or a hospital catch a worm? Panic everywhere. Why is everyone so …

Read the Full Story
0