Hypocrisy Plaguing Major VPN Providers

The issue of online privacy is a hot topic in the post-Snowden world. One would think world governments would scale down on their efforts to track everything and everyone online, however that hasn’t been the case. Bill C51 in Canada, new data retention laws in Australia, CISA in the US, and the upcoming Trans-Pacific Partnership

Adwind # malware-as-a-service

The Adwind RAT (remote access tool) is a cross-platform, multifunctional malware program also known as AlienSpy, Frutas, Unrecom, Sockrat, JSocket and jRat, which is distributed through a single malware-as-a-service platform. The Java-based nasty can run on Windows, OS X, Linux and Android platforms, providing hackers with remote desktop control, data gathering, data exfiltration and more.

Is it safe anywhere?

Not if you work for a US “TLA”. It’s ok for every service provider with a keyboard to give use password security advice, but what good is that if they keep leaving the keys to the safe on the fridge. Hacker Plans to Dump Alleged Details of FBI and DHS Employees A hacker, who wishes to remain

Playing Russian Roulette with your laptop

This is not a “tech”  blog, but, on a quiet day there may be things you might like to read concerning the welfare of your hardware. There are probably times when you have updated your laptop, but have not yet cloned/imaged the new set up to your backup. During that time your setup is exposed – not

IE11 + Sandboxie vs Chrome

Hey guys, so I just went through all the labour of reformatting my computer to a fresh fully patched state of cleanliness. It is running Windows 7 SP1 x64 with the Enterprise hotfix rollup, all Microsoft updates installed (with the exception of the Windows 10 & telemetry updates) and Microsoft Security Essentials. Now before I

The ultimate network security checklist

Four years ago we posted the first version of the ultimate network security checklist. We have now updated it and it can be found here: http://www.gfi.com/blog/the-ultimate-network-security-checklist/ This is a document to provide you with the areas of information security you should focus on, along with specific settings or recommended practices that will help you to

Can You Spot the Suspicious Behavior?

Breaking into a run. Standing too long in once place. Repeatedly looking over your shoulder. Everyone does these things from time to time, and they aren’t usually cause for alarm. But in Esther Hovers’ series False Positives, such things are very suspicious indeed, and suggest a heinous crime may soon occur. Her images emulate the

Linux Mint 17.3 Rosa Xfce

For those that have never used Linux the change has probably been seen as daunting. But, over the past few years things have changed. Some of you may need an Excel and Outlook in your working life, but as for the rest, the Linux options are now more than capable. There’s also no need to

Firewalls Exposed

As the commercialization of the Internet enters its third decade, the Web itself has evolved from sharing static information to driving dynamically connected mission-critical applications. While web applications and efficiencies of Web 2.0 are universally adopted, network security practices often still rely too heavily on the basic network firewall to block access to static information.

TLA’s in glass houses

A multi-billion U.S. Dollar firewall run by the Department of Homeland Security meant to detect and prevent nation-state hacks against the government functions ineffectively. The US spends billions spying on its citizens and the rest of the world. Then it bitches when other countries [China] do the same thing. If the US used the same

Lifehacker U: Autumn Semester 2016

Anyone with a little time and a passion for self-growth can audit, read and “enroll” in these courses for their own personal benefit. Schools like Yale University, MIT, Stanford and the University of California at Berkeley are all offering free online classes that you can audit and participate in from the comfort of your office


Many of you may be using W10. If not you, perhaps a parent or a friend. As you are probably the go to IT person, here’s a thread that may help you help the others. The more time I spend testing and exploring Windows 10 – so you don’t have to – the more I realize how displeased

Putting the spotlight on firmware malware

Firmware malware has been a hot topic ever since Snowden’s leaks revealed NSA’s efforts to infect BIOS firmware. However, BIOS malware is no longer something exclusive to the NSA, Lenovo’s Service Engine or Hacking Team’s UEFI rootkit are examples of why the security industry should put some focus on this strain of badness. As of

NSA Hacker Chief Explains

No vulnerability is too insignificant for the NSA to exploit. Don’t assume a crack is too small to be noticed, or too small to be exploited. If you do a penetration test of your network and 97 things pass the test but three esoteric things fail, don’t think they don’t matter. Those are the ones

Tails 2.0

Tails, the operating system Edward Snowden used to protect his identity online before he blew the whistle on the NSA’s mass surveillance programs, reached version 2.0, bringing some major new improvements. Those who have already been using Tails will have to install Tails 2.0 from scratch, as the new changes make it impossible to provide