Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
Over 100,000 former adult students in Virginia are being contacted by the education authorities after a USB stick with information including their names, social security numbers and employment and demographic details, was misplaced. The data was not encrypted, the Washington …
I decided to go a bit further than usual, and push the limits of the unknown. I decided to install Funtoo, a Gentoo based distro or rather fork, by the Gentoo fouder Daniel Robbins. Daniel is no longer active in …
It was a warm, arid evening when MAX stepped off the plane in McClaren Airport in fabulous Las Vegas, Nevada. MAX brought his favorite crew – Kevin Hodak, Sales Engineer, Anne Murphy, Channel Marketing Manager and Kelly O’Bray, Post Sales …
Last week I commented on the phishing attack that resulted in more than 10,000 passwords being leaked online. An analysis of the passwords showed that many computer users are more concerned with choosing a password that they can remember rather …
The GFI EMEA Distributor Conference 2009 was held on Friday, October 9 at The Palace Hotel in Sliema. There were 38 EMEA Distributors present plus executive management, the EMEA sales team, members from Product Management and members from the Marketing department. …
Security vulnerabilities in software applications are the most important factor that helps malware to spread. The number of known vulnerabilities is increasing every day. Vulnerability databases like National Vulnerability Database, SecurityFocus or Secunia publish thousands of new vulnerabilities each year. …
I came across a story by Nick Farrell of the Inquirer about a case that happened to an Australian Power company. The crux of the story is that a virus infected the company’s infrastructure and was spreading inside the network. …
So it happened that the disk hosting our code repository developed some bad blocks. Must be contagious or something, this is already the third system within a month… I noticed this, when I received some strange messages from cron. Basically …
A mass operation is underway to infect several thousands of computers worldwide. The attack from the malware writers is taking place from various sources using an array of different techniques. Information regarding this attack until now is very limited however …
The phishing attack that led to more than 10,000 Hotmail, MSN and Live.com passwords being exposed online earlier this week has provided an interesting glimpse into the mindset of email users when setting up their accounts. A researcher who managed …