Follow GFI:
Find us on Facebook Follow us on Twitter Find us on Linkedin Subscribe to our RSS Feed Find us on YouTube Find us on Google+
 

The 31 Worst Face-Palm Moments in IT

on August 2, 2013

You’ve probably heard the phrase “The Good, the Bad, and the Ugly”. I want to introduce another in the same vein as that – “The Dumb, the Stupid, and the Unbelievable”. I’ve been an IT consultant for many years, and …

0
 

Show me the money… honestly!

on October 2, 2009

Yesterday, we took our one-year-old daughter for a day out to a local fruit farm and tried to go to their play complex.  I asked ‘how much to take our kid in’?  ‘We charge £4.25 per adult’ said the attendant, …

3

GFI Software acquires hosted email filtering company Katharion

on October 1, 2009

We are pleased to announce the acquisition of Los Angeles-based hosted email filtering company Katharion. Through this acquisition, we will be able to offer a hosted email filtering, anti-spam and anti-virus service later this quarter. “This is the next step …

0

US SMBs fail to recognize security threats in the workplace

on September 30, 2009

Results of a recent survey showed that nearly half of small and medium-sized businesses (SMBs) in the US do not have the means to monitor or filter Internet traffic and employees’ online activity. These figures indicate that not only are …

0

Keeping your bank accounts safe from cybercriminals

on September 30, 2009

I have dealt with cyber crime in a number of previous posts, such as the 21st Century heists series. This post chronicles a recent event about some of the themes tackled in that series. Finjan has recently released a report about …

0

GFI MAX Around the World Competition closes tomorrow!

on September 29, 2009

MAX has visited Greece, Sicily, Malta, London, and even the Moon during the month of September. All those people who sent in their MAX photos are in for the chance of winning a fantastic SONY VAIO netbook! The first hundred …

5

DHL Delivery Problem NR.59544

on September 28, 2009

DHL Delivery Problem NR.59544 Another day, another example exposing the fragile human security in an organization. Malware writers and spammers greatly depend on disguising their payload as innocent messages or software, which may even pretend to be offering a form …

6

Identity Theft

on September 25, 2009

A while ago I wrote a series of articles about theft in the modern age that provided an in-depth account on how malicious people were stealing using technology in the modern age. I recently came across a very interesting article by Jacqui …

1

Note to Self!

on September 24, 2009

I work in marketing (I think? Or I did and nobody has told me otherwise) for a Software Company. They provide software to help run IT Companies, or as they seem to be known (in some cases) Managed Service Providers! …

1

Zero-day flaw in Microsoft Internet Information Service (IIS)

on September 22, 2009

Recent figures put Microsoft IIS as the second most popular web server on the internet, second only to the Apache HTTP Server. It is therefore of no surprise that following the Apache site breach on 28th September ’09, it was …

2

CSVDE – A Means to Simplify Active Directory Administration (Part 3)

on September 17, 2009

Importing Data from AD In Part 2 we  discussed how to export data from a working Active Directory installation. That was the easy part, now the real fun begins as we discuss how to import data to your Active Directory …

0