Security Archives Page 3

Going to Sochi? How to avoid an Olympic hack attack

With thousands of athletes, officials and spectators descending on Sochi, Russia for the Winter Olympic Games, that’s a lot of laptops, tablets and mobile devices. And a tempting target for cyber criminals, and

Share on LinkedIn Comment on this article Share with Google+ Published on: February 11th, 2014 Jeff Jedras

‘Huge’ Sophos SafeGuard Encryption upgrade takes data-first approach

Sophos announced a new version of its Safeguard Encryption suite that it says addresses today's mobile-driven, multi-platform IT environment by taking a data-first approach to encryption. Sophos SafeGuard Encryption version 6.1 is being

Share on LinkedIn Comment on this article Share with Google+ Published on: February 11th, 2014 Brian Jackson

Securing your database is about more than just securing your network

If you run a business harbouring sensitive information within a database – anything from intellectual property, to digital cash, to your customers’ data – you need to secure it. It sounds like such

Share on LinkedIn Comment on this article Share with Google+ Published on: January 21st, 2014 Candice So

Hackers can now log your keystrokes from your touchscreens

Hackers now have yet another way to trace your keystrokes – but it’s not the physical keyboard with its sturdy, plastic keys that they’re now after. A researcher at Trustwave Holdings Inc. has

Share on LinkedIn Comment on this article Share with Google+ Published on: January 20th, 2014 Candice So

DDoS attacks now coming from mobile apps, Prolexic report says

Hackers are now using mobile apps to launch distributed denial of service (DDoS) attacks against enterprise clients, according to a new report from Prolexic Technologies Inc., a security solutions provider focused on protecting

Share on LinkedIn Comment on this article Share with Google+ Published on: January 14th, 2014 Candice So

Trend Micro’s 5 predictions for cybersecurity in 2014

Mobile banking heists, exploited vulnerabilities, and data breaches – these could be the cybersecurity hallmarks of 2014, according to a new report from security software provider Trend Micro Inc. In a report released

Share on LinkedIn Comment on this article Share with Google+ Published on: January 2nd, 2014 Candice So

Ron Deibert: Internet freedom comes down to a ‘clash of two world views’

For anyone following cybersecurity and digital privacy, 2013 has been a whirlwind. When former National Security Agency (NSA) contractor Edward Snowden took the lid off of U.S.’ cybersurveillance activities this past June, unleashing

Share on LinkedIn Comment on this article Share with Google+ Published on: December 17th, 2013 Candice So

Toronto airport launches self-serve passport kiosks

If you’re headed down to some warm, snow-less place in the U.S. for the holidays, and you’re passing through Toronto, you may want to take note – you can now use your passport

Share on LinkedIn Comment on this article Share with Google+ Published on: December 9th, 2013 Candice So

Major tech brands form coalition in response to PRISM leaks

In the wake of government surveillance programs leaked by National Securities Agency (NSA) contractor Edward Snowden, major tech industry firms are forming a coalition and calling on governments worldwide - starting with the

Share on LinkedIn Comment on this article Share with Google+ Published on: December 9th, 2013 Brian Jackson

IT administrators are shadow IT’s worst culprits

We've all been warned about the dangers of the bring-your-own-device (BYOD) phenomenon - employees are using their personal devices for work, and with those personal devices come their own apps for storage and

Share on LinkedIn Comment on this article Share with Google+ Published on: December 6th, 2013 Candice So

Obama advisor paints picture of cyber-security in 2020

The Internet will look very different in 2020. Internet users will double from the number in 2010 to total of 4 billion in 2020, and that's just the beginning - there will be

Share on LinkedIn Comment on this article Share with Google+ Published on: November 27th, 2013 Brian Jackson

Cybersecurity video highlights from Technicity

Canadian cyber-security experts from both the public and private sector descended upon Toronto today to take part in Technicity, an event co-hosted by IT World Canada and the City of Toronto. In between

Share on LinkedIn Comment on this article Share with Google+ Published on: November 26th, 2013 Brian Jackson

The Internet is a ‘friend, but there are foes,’ Michael Geist says

Thinking about privacy and security isn’t about just fighting cybercrime anymore – it’s about considering where our data is headed and how it’s being used. That’s according to Michael Geist, Canada’s research chair

Share on LinkedIn Comment on this article Share with Google+ Published on: November 26th, 2013 Candice So

Stealing credit card numbers from Apple point of sales terminals? Easier than you might think

With consumers forming snaking, long lines in stores before the holidays, businesses are adding more and more mobile terminals so their customers can buy directly from salespeople on the floor. This may speed

Share on LinkedIn Comment on this article Share with Google+ Published on: November 25th, 2013 Candice So

File sharing apps full of security flaws – even from Apple App Store

A file sharing application may be a quick and handy way to get a file from point A to point B – but it may also be riddled with gaping security holes, according

Share on LinkedIn Comment on this article Share with Google+ Published on: November 25th, 2013 Candice So