White Hat Hackers – the forgotten good guys

Last week we discussed why hackers do what they do. Today we will be looking at ‘white hat hackers’ and why most of the time they are the forgotten good guys in the IT world.

Continue reading

Monday Tech Roudup – Bad patching, good BlackBerry

From bad patches to good Blackberry profits to nasty DDoS attacks to generous Apple benefactors. it’s all here in our Monday Tech Roundup.

Continue reading

Was the Melodifestivalen hack really a hack or app failure?

While there is still a bit of mystery surrounding the Melodifestivalen incident, there are also lessons to be learned.

Continue reading

Monday Tech Roundup – The who, what, where and when of Windows 10

In our Tech Roundup this week we talk about the who, what, where and when of Windows 10 together with news of China admitting to a cyber-warfare unit and we also reveal some words of wisdom Snowden has for IT Pros.

Continue reading

Apple Watch – a new wrist-bound threat?

Apple Watch, this intelligent little bracelet, is every bit wearable tech and IoT, and it comes with all the security risks of every other IoT device.

Continue reading

Monday Tech Roundup – From Apple Watch to Superfish

In the first edition of Monday Tech Roundup we tackle Apple’s innovation with the Apple Watch, the new MacBook Surface strategy and a less stinky Superfish.

Continue reading

Beware: Spam, scams and phishing this St Patrick’s day

Scammers just love big, national celebrations. Tomorrow is St Patrick’s Day. That means money, targeted scams and digital trickery.

Continue reading

New Obama cybersecurity agency has lessons for us all

U.S. President Barack Obama launched a new cybersecurity agency that aims to pull together security information from other agencies to gain a better overview of the overall threat and find new ways to fight it.

Continue reading

The dangers of unintentional web requests and hidden social media

Learn how GFI WebMonitor can strengthen your web security by distinguishing between direct and indirect web requests.

Continue reading

It’s time to take care of your Internet immunity

Increase your Internet immunity – here’s a white paper on how to understanding today’s top online threats and how to guard against them.

Continue reading