Security Archives - Page 3

Security threats, five years after Intel bought McAfee

Intel Corp. recently released its McAfee Labs Threat Report 2015, marking five years since the chipmaking giant acquired the security company to complement its portfolio of products. The report is a retrospective of

Published on: September 8th, 2015 Dave Webb

It’s time to start thinking about securing the Internet of Things: Dell

LAS VEGAS – Dell sees great potential in the Internet of Things for the line of business worker but adds it’s never too early to start thinking about how to keep all of

Published on: September 8th, 2015 Jeff Jedras

Manulife calls on voice biometrics to authenticate customers over the phone

Manulife has joined the expanding list of Canadian financial services companies betting on biometrics to boost security. The company said Tuesday that customers can now use their own voices to authenticate their identities

Published on: September 2nd, 2015 Christine Wong

Dell pitches identity & access management as answer to business complexity

LAS VEGAS – When users, partners and IT managers think of Dell and security, the SonicWall firewall product likely comes to mind. But the vendor is building a security portfolio that integrates all

Published on: August 31st, 2015 Jeff Jedras

BlackBerry broadens support for secure file sharing tool WatchDox

BlackBerry Ltd. has unveiled new platform support and a new app for WatchDox, its secure enterprise file sharing and mobile content management solution. The Waterloo, Ont.-based mobile communications solutions vendor has launched a

Published on: August 26th, 2015 Jeff Jedras

Not only are DDoS attacks increasing, they’re also lasting longer

New research from data security solutions vendor Imperva sheds new light into directed denial of service (DDoS) attacks against businesses, showing not only are attack volumes increasing – attacks are lasting longer as

Published on: August 26th, 2015 Jeff Jedras

New DDoS attack avenue can be blocked: Level 3

News about security breaches affecting major companies is now becoming commonplace. Just two days ago, hackers posted sensitive information about users of Ashley Madison. Now Toronto-based telecom vendor Level 3 Communications has revealed a new

Published on: August 21st, 2015 Wolston Lobo

Internet of Everything opens new attack vectors for cybercriminals: Cisco

The digital economy and the Internet of Everything (IoE) are inspiring new attack vectors and monetization schemes for cybercriminals that organizations will need to defend against, according to a new report from networking

Published on: August 12th, 2015 Jeff Jedras

Kaspersky Lab adds private browsing, stops freeware from changing settings

With the latest update of its line of flagship security solutions for home users, security vendor Kaspersky Lab has added several new features, including private browsing and new change control that can prevent

Published on: August 10th, 2015 Jeff Jedras

Route1’s MobiKey now supports Android devices

Secure access technology vendor Route1 Inc. has added support for the Android OS to MobiKey, its secure mobile access solution for businesses that need to control access to their sensitive information. Toronto-based Route1’s

Published on: August 5th, 2015 Jeff Jedras

Programmatic advertising fuelling the rise of malvertising: study

Cyber criminals are quick to exploit any advance in technology, and it appears they’ve clambered aboard the programmatic advertising bandwagon to launch a new style of malware: malvertising. IT security company RiskIQ used

Published on: August 4th, 2015 Jeff Jedras

Five security steps to take before using your new smartwatch for business

The smartwatch revolution is near, and sales of these hot new wearable are sure to be strong for back to school. However, a new report is raising serious security concerns about that little

Published on: July 27th, 2015 Jeff Jedras

Salesforce Shield helps regulated industries build secure apps

While the app economy has companies keenly aware of the need to bring their apps to market quickly to keep up with their competition, but for companies with serious governance concerns or in

Published on: July 16th, 2015 Jeff Jedras

Apple updates require email servers to use boosted encryption or none at all

Some businesses running their own email servers are faced with a choice to either upgrade their level of encryption to meet Apple Inc.'s new standards, or use none whatsoever. After upgrading in-house Apple

Published on: July 7th, 2015 Brian Jackson

Beware Aquaman! Sinister superheroes pose Internet security threat

Superheroes might protect you from the evils of the physical world, but according to Intel Security’s recent study, their super powers are useless on the Internet. Intel Security recently released its third annual

Published on: July 3rd, 2015 Jackie Atkins