Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
This competition is now closed. Latest Update from the team: We crossed the finish line last night at 7pm. We are pretty excited to finally be here. (August 25) August 19: We are in Novisibirsk, Russia, not too far August …
Hot news off the press! GFI MAX RemoteManagement now features Take Control for easy, fast, secure remote access and user assistance. Managed Service Providers (MSPs) and IT support companies can now connect easily and securely to any monitored server or …
The FIFA World Cup 2010has come and gone; however, spammers and malware writers are still exploiting this global event as happened previously with the Icelandic Volcano eruption. One particular targeted attack related to the World Cup was socially engineered with …
The grand prize winner of the GFI World Cup Competition is… ANNE TOZER (United Kingdom). Congratulations Anne, you’ve won yourself an Apple iPad, GFI Software license key, GFI laptop rucksack and GFI T-shirt! All other winners have been contacted via …
The grand prize winner of the GFI World Cup Competition is… ANNE TOZER (United Kingdom). Congratulations Anne, you’ve won yourself an Apple iPad, GFI Software license key, GFI laptop rucksack and GFI T-shirt! All winners have been contacted via email. …
We have enhanced our Security Product Offering with the Acquisition of Sunbelt Software and specifically its VIPRE® product suite. The acquisition will allow us to merge VIPRE technology into our email security and web security solutions group, and will provide …
Twitter has, like similar social networking sites, raised many security questions – especially when it comes to whether businesses should allow employees access in the workplace. While many businesses have adopted Twitter as part of their marketing arsenal, they would …
Security breaches threaten not only your infrastructure and data integrity, but also your standing in the business community and your organization’s very survival. The protection of personally identifiable information (PII) has become a necessity in many areas, mandated via local, …
Education is an integral part of security. Educating your employees can be an effective defence against attacks; it can also help save money in some cases. Part of your bandwidth costs is consumed by spam and as such educating employees …
In the past decade the internet has surpassed all expectations and changed the lives of us all. The World Wide Web holds little or no safety for the end user. Very much like the Wild West in the 1800s, the …