You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …
If you are a Twilight fan and eagerly looking forward to the latest movie, New Moon, watch for a viral marketing campaign that is currently doing the rounds on the Internet. USA Today reported this week that scammers and malware …
After talking about mobile phones as a threat to your organization we will today discuss yet another device widely in use and that too has the potential of being misused in a way that can compromise your organization. This device …
Some time ago I wrote an article about preventing virtual theft – theft of goods from a virtual world (such as a game) by compromising the machine from which you play the game – and loyal reader John Mello pointed …
After installing Windows Patches the user may find strange looking folders (with names that are hexadecimal numbers, i.e. only letters a-z and 0-9) at the top level of a drive. Some of these folders are only temporary folders and are …
Two men in Indiana, US are facing up to five years in prison and a quarter of a million dollar fine after they were allegedly caught using old passwords to gain access to the company’s network even though they were …
Today I saw a ‘how-to’ of what is supposed to be the ‘perfect server‘ setup. Well, the ‘perfect’ was not meant literally, but the setup is in fact very nice – from a functional point of view. Open source is …
We have talked a lot about theft in the real world so I guess it is about time we also discuss theft in virtual world. The BBC reported that some Trojan software are now targeting Online Games and stealing login information …
GFI WebMonitor 2009™ is now available as a stand-alone proxy. The perfect internet monitoring solution for the SMB market, this new version of GFI WebMonitor will work in most networking environments and allows administrators to manage and control employee access …
Security is all about identifying threats and provisioning for them before your enemy exploits that threat. There are so many vectors to take care of that it truly is a daunting task. Input validation, perimeter control, user education, cryptography, physical …
Time and time again we read stories about malicious people using Trojans to steal money. This time it happened to Cumberland County Redevelopment Authority where, by using a Trojan, a malicious hacker stole nearly half a million dollars. Brian Krebs …