Here are 20 of the best free tools that will help you conduct a digital forensic investigation. Whether it’s for an internal human resources case, an investigation into unauthorized access to a server, or if you just want to learn …
One aspect of security that is often overlooked is the Human Element. People are a factor in IT infrastructure and as such are also a possible attack vector. Business organizations should take this aspect of security as seriously as any …
David Kelleher, communications and research analyst at GFI Software discusses how GFI are helping SMBs to recognize the importance of investing further in their security. The main cause of the problem lies in the attitude that SMBs have towards security, …
A random thought popped into my (mostly empty) head this morning. During the last few years that I was running my IT company, I changed from being very nervous when asking for money to being much more comfortable. I think the turning point was a book …
Just an throwaway marketing thought… It’s a scientifically proven fact that people tend to adopt a ‘herding instinct’ in times of uncertainty. I think the decision process goes something like this: ‘Jeezo – I’m worried. The quickest way I can …
Viruses, Trojans, worms, spyware, malware, rootkits, phishing, botnets, cross-site scripting, vulnerabilities… the list of buzzwords goes on. These words all mean something to us in the security arena, but for the general public they’re just indistinguishable words that geeks use. …
In Part 1 of this post we examined how SPF works. Now we’ll go into how to create and publish SPF records. Creating an SPF record for your domain The procedure outlined below can be divided into several stages: Determine …
The Sender Policy Framework (SPF) is a community-based effort that requires senders to publish their mail server in an SPF record. This record is used to detect forged senders. How does SPF work? The basic idea behind Sender Policy Framework …
Whilst most SMEs recognize the importance of IT security in a company and would consider installing anti-virus and anti-spam software, they often fail to realize the internal threats that could pose a risk to their business. Disgruntled employees, such as …
It’s not always easy for a business to survive in a cutthroat market, especially one that is going through an economic downturn. Therefore, when already hard on cash, and striving to maintain revenues and profits, the last thing that a …
You may already be familiar with SPAM emails that contain just one sentence about weight loss; Oprah and the infamous Acai berries. What is interesting about this current spam storm is that the spammer did not try to bypass any anti-spam filtering technologies. Surely, most products would have filtered such email as spam. Hence, the question to pose is ‘What is the aim of such spam?’