Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

Google searches, Cyber Monday and the Holiday season

on November 26, 2009

If you are a Twilight fan and eagerly looking forward to the latest movie, New Moon, watch for a viral marketing campaign that is currently doing the rounds on the Internet. USA Today reported this week that scammers and malware …

0

Hacking Devices – Ensuring your printer is secure

on November 20, 2009

After talking about mobile phones as a threat to your organization we will today discuss yet another device widely in use and that too has the potential of being misused in a way that can compromise your organization. This device …

2

Hacking Devices – How to protect yourself from data theft

on November 19, 2009

Some time ago I wrote an article about preventing virtual theft – theft of goods from a virtual world (such as a game) by compromising the machine from which you play the game – and loyal reader John Mello pointed …

2

How to Delete Windows Patch Install Folders in Vista

on November 12, 2009

After installing Windows Patches the user may find strange looking folders (with names that are hexadecimal numbers, i.e. only letters a-z and 0-9) at the top level of a drive.  Some of these folders are only temporary folders and are …

0

When employees bite back – Security in organizations

on November 9, 2009

Two men in Indiana, US are facing up to five years in prison and a quarter of a million dollar fine after they were allegedly caught using old passwords to gain access to the company’s network even though they were …

2

compiled from source = bad security practice

on November 6, 2009

Today I saw a ‘how-to’ of what is supposed to be the ‘perfect server‘ setup. Well, the ‘perfect’ was not meant literally, but the setup is in fact very nice – from a functional point of view. Open source is …

2

How to prevent Virtual Theft

on November 5, 2009

We have talked a lot about theft in the real world so I guess it is about time we also discuss theft in virtual world. The BBC reported that some Trojan software are now targeting Online Games and stealing login information …

2

GFI WebMonitor 2009™ launches as stand-alone proxy version

on November 3, 2009

GFI WebMonitor 2009™ is now available as a stand-alone proxy. The perfect internet monitoring solution for the SMB market, this new version of GFI WebMonitor will work in most networking environments and allows administrators to manage and control employee access …

0

Search Engines, Friend or Foe?

on October 30, 2009

Security is all about identifying threats and provisioning for them before your enemy exploits that threat. There are so many vectors to take care of that it truly is a daunting task. Input validation, perimeter control, user education, cryptography, physical …

4

Protecting against Money Theft

on October 29, 2009

Time and time again we read stories about malicious people using Trojans to steal money. This time it happened to Cumberland County Redevelopment Authority where, by using a Trojan, a malicious hacker stole nearly half a million dollars.  Brian Krebs …

0