Latest posts

Page 2

Is there a severity greater than critical?

It’s Patch Tuesday again and it’s really time you paid attention. A lot of attention. MS15-011 covers a security issue that, were I in charge of the ratings names, I would rate as Super-critical – because of the potential for exploitation more than its potential impact. If you have anyone taking a domain-joined workstation outside the corporate network, patch it now.

Continue reading

61 network security twitter feeds to follow

Information security pros abound on Twitter. While not all of their tweets may be 100% focused on InfoSec, we’ve picked 61 network security Twitter feeds we think are worth following.

Continue reading

Introducing GFI LanGuard 2015

GFI LanGuard is available today. Product manager Cristian Florian tells us what’s new in the latest release

Continue reading

Software vulnerabilities: Only half the story

Intermediary devices such as routers and WAPs can be targeted by attackers. The latest example is an exploit that takes aim at a security vulnerability in routers made by a number of popular vendors, including D-Link, ZTE and TP-Link.

Continue reading

SMS for business gets the message across [Infographic]

According to statistics in a recent report by SAP, 74 percent of adults use SMS on a regular basis, and 64 percent said they believe businesses should make more use of SMS to interact with their customers.

Continue reading

23 network security mistakes that could get you fired

Depending on your boss, the impact to company or customer and seriousness of a mistake, some can be career-limiting or, even worse, send you back to the job market before you even know it. Let’s take a look at those network security mistakes that could get you fired.

Continue reading

GFI MailEssentials wins 5th VBSpam+ award from Virus Bulletin

In the January 2015 round of testing, GFI MailEssentials had a spam catch rate of more than 99% and 0 False Positives, thus winning a 5th VBSpam+ award.

Continue reading

Security 101: Authentication (Part 1)

In this post, we’re going to look at the first of the three As: Authentication. We’re going to focus on authentication as confirming a user.

Continue reading

Third party patch roundup – January 2015

Although Microsoft issued only eight updates this month, Apple and Linux systems both saw fixes for more vulnerabilities than usual, Oracle released its regular quarterly critical update, and Adobe found itself having to get out not just one but two out-of-band updates.

Continue reading

Can you secure your keep?

In how many ways can one of your network’s hosts become compromised? Well, according to independent security testing company The AV-TEST Institute, somewhere north of 300 million.

Continue reading