Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
The competition is now closed! Good luck to all who participated. Here’s your chance to participate in our fantastic festive season competition and win some luxury prizes; there’s an Asus netbook, a Sony camcorder and a Panasonic camera all up …
We’re happy to announce another great GFI competition for this holiday season where you can win the following fantastic prizes! The rules are simple and everyone who participates has an equal chance to win, so give it a shot and …
Managed Service Providers believe most Remote Monitoring and Management (RMM) systems end up being ‘shelfware’ We conducted industry research on Remote Monitoring & Management (RMM) software for Managed Service Providers (MSPs), Value Added Resellers (VARs) and IT support organizations and …
In a previous post, I had talked about two employees who are charged with having allegedly gained access to their former employer’s network even though they had left the company a couple of years before. This week a former employee …
We are extremely pleased and proud to have been named 2009 Tech Innovator by Everything Channel’s CRN. Everything Channel’s Tech Innovator listing celebrates technology vendors that have introduced new solutions that drive advances throughout the technology channel. GFI MAX, our …
If you are a Twilight fan and eagerly looking forward to the latest movie, New Moon, watch for a viral marketing campaign that is currently doing the rounds on the Internet. USA Today reported this week that scammers and malware …
After talking about mobile phones as a threat to your organization we will today discuss yet another device widely in use and that too has the potential of being misused in a way that can compromise your organization. This device …
Some time ago I wrote an article about preventing virtual theft – theft of goods from a virtual world (such as a game) by compromising the machine from which you play the game – and loyal reader John Mello pointed …
After installing Windows Patches the user may find strange looking folders (with names that are hexadecimal numbers, i.e. only letters a-z and 0-9) at the top level of a drive. Some of these folders are only temporary folders and are …
Two men in Indiana, US are facing up to five years in prison and a quarter of a million dollar fine after they were allegedly caught using old passwords to gain access to the company’s network even though they were …