Tag Archives: security news

Using Caution with Email Attachments

Why can email attachments be dangerous? Some of the characteristics that make email attachments convenient and popular are also the ones that make them a common tool for attackers: Email is easily circulated – Forwarding email is so simple that … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Network Security, Software Security Risks, Uncategorized | Tagged , , , , , | Leave a comment

Understanding Your Computer: Email Clients

How do email clients work? Every email address has two basic parts: the user name and the domain name. When you are sending email to someone else, your domain’s server has to communicate with your recipient’s domain server. For example, … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Uncategorized | Tagged , , , , | Leave a comment

Recovering from Viruses, Worms, and Trojan Horses

How do you know your computer is infected? Unfortunately, there is no particular way to identify that your computer has been infected with malicious code. Some infections may completely destroy files and shut down your computer, while others may only … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Information Security, isecurity, Uncategorized | Tagged , , , , , , | Leave a comment

Google vs. Microsoft vs. Apple: Software Security Risks – Year-End 2011

by Abbas Mirza Dec 26, 2011 2:30 am Google, Microsoft and Apple are constantly engaged in a struggle for industry dominance, competing in software as well as hardware ranging from computers, smart phones and multimedia devices. Meanwhile, the three companies … Continue reading

Posted in Computer Security, Cyber Security, G7 Security, Hacked, Information Security, Network Security, Risk Management Strategies, Software Security Risks, Technology | Tagged , , , , , , , , , , , , , , , , , | 2 Comments

G:7-Security Launches Cyber Security iPhone App

Latest update: G7 Security’s Cyber Tools module successfully completed it’s beta phase and is now live after the release candidate 2 finalized earlier this week. Continue reading

Posted in Computer Security, Cyber Security, Information Security, Network Security, Technology | Tagged , , , , , , , , , , , , , , , , , , , , , , , , , , , | Leave a comment

Web Head, CNF win $2.3 million Air Force contract

Monday, March 23, 2009, 4:09pm CDT Web Head, CNF win $2.3 million Air Force contract San Antonio Business Journal Two San Antonio technology firms have been awarded a contract to provide mission-critical cyber-security support to the U.S. Air Force Network … Continue reading

Posted in Cyber Security | Tagged , , | Leave a comment