Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
I came across an excellent story by Ars Technica on the Stuxnet malware. It’s well worth the read as it goes into detail on how the virus originated, how it was analyzed and how security researchers got to the bottom …
We know administrators love tools that make life easier – especially when they’re free! So here are 101 of them! Any free tools you know of that are missing from this list? Leave us a comment! We know administrators love …
The Rotary Foundation has honored the GFI Charity Fund Committee in Malta for its ongoing support in the form of helpful and eager volunteers for Rotary’s various hands-on initiatives in Malta as well as via financial assistance to help those in …
It’s official. Intelligent people do dumb things. Earlier this month, an internet fraudster – who had cashed in nearly half a million pounds – was put behind bars for two years for his part in a gang running various web-based …
There are a number of software products that can help you protect your network from both internal and external attacks. Protecting the network with these tools is, relatively speaking, the easy part. The hard part is to design security policies …
There are several reasons why you need to limit Internet access on the network. Perhaps your company is experiencing a problem with individuals’ productivity. Or Human Resources has determined that there is an issue with certain employees’ web access. Maybe …
I had an interesting discussion with a couple of colleagues on the value of consumer security research to the business community. They argued that a business is not really interested in what home users do and, moreover, the security risks …
There are different objectives behind malware and hacking attacks, and one of the primary reasons is obviously financial gain. The methods malicious hackers use to achieve financial gain have over time changed and evolved. In the past, this activity centered …
In the early days of web content filtering it was enough to configure a firewall to block certain sites from being accessed. An SME would maintain a blacklist of forbidden sites and update that list from time to time. This …
Spam is a pain to deal with. It clogs up your mailbox, brings down mail servers, and can harbor viruses and malware. As much of a hassle spam is to deal with, at least it brings the promise of excitement …