Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

How to confirm your systems aren’t suffering a major Heartbleed

on April 15, 2014

The Internet was rocked last week when a two-year-old bug in OpenSSL was revealed. Heartbleed, as the vulnerability is known, can result in massive information disclosure through simple requests that require no privileges, and leave no logs. Anything from command …

0
 

The 17 Facepalm Moments that Rocked Twitter

on December 9, 2013

When you have only a dozen followers on Twitter, and you’re related to half of those, making a misstep or faux pas in social media is no big deal. But when you have hundreds of thousands of followers, or are …

0

10 Tips to Enforce Your Online Security

on December 6, 2013

I recently wrote an article called What the Hack, in which I discussed the spate of hack attacks happening at the time. Unfortunatley, not much has changed since then, and we keep on hearing of more and more password leaks, …

10

9 Holiday Phishing Scams to Look Out For

on December 6, 2013

During this very hectic and busy time of year, online shopping, charity events and package deliveries increase in frequency. Cyber-criminals are aware of this and attempt to take full advantage of both the opportunity and the fact that because many …

1

Mobile Device Management: The New Moneymaker for MSPs

on December 5, 2013

Cuba Gooding, Jr. won an Oscar® for his role as Rod Tidwell, the gum-flapping NFL wide receiver whose four-word mantra is perhaps the most memorable line from the 1996 blockbuster Jerry Maguire.

0

Analyzing Email Communications (Part 3)

on December 4, 2013

At one time or another, you’ve surely needed to quickly find a specific email that’s been buried by the many other messages in your inbox. It can be like searching for a needle in a haystack. And with all your …

0

Cloud-based Security: Rapid Early Adoption Means Widespread Use

on December 3, 2013

Sitting on the beach you glance over at your laptop and notice that a few workstations have just signed on. Its business as usual back at the office and your employees will be logging in across the country over the …

0

Thwart the Bad Guys with Advice from the IT Security Experts

on December 3, 2013

It’s been a turbulent year for IT security. Cybercrime is ever-present and hacktivist organizations are becoming more active.

0

MaaS – The Industry to Be Wary Of

on December 2, 2013

Cloud-based services are increasing in popularity these days: almost every kind of software is now available as a cloud- or software-as-a-service (SaaS) offering and that, unfortunately, also includes malware distribution. In fact, Malware-as-a-service (MaaS) is by far the most common …

0

Beware the Ides of Cyber Monday

on November 30, 2013

‘Tis the season to … go shopping?  In the U.S., the day after Thanksgiving – often called “Black Friday” – has traditionally been the heaviest shopping day of the year. Spending on that day in 2012 totaled a record-breaking $59.1 …

0

Beware the Black Clouds this Friday

on November 28, 2013

Who doesn’t love a bargain? Black Friday is one of those days we all wait for when an item we had set our eyes on weeks or months before, becomes available at a price that suits our budget. It doesn’t …

0