AskMen.com sending visitors to download malware, Websense says

Updated on June 24, 2014 at 4:50pm ET to reflect comments from AskMen.com. Hackers have compromised AskMen.com, a men’s interest website on dating, celebrity news, and health – and they could be infecting

Share on LinkedIn Comment on this article Share with Google+ Published on: June 24th, 2014 Candice So

How Cryptolocker and ransomware take data hostage

From “software leases” to Cryptolocker, ransomware has been around for a while – but criminals are now taking victims’ data hostage as a way to make money, moving to mobile devices and other

Share on LinkedIn Comment on this article Share with Google+ Published on: June 19th, 2014 Candice So

Canadian security professionals unsure about defenses, Ponemon study finds

A little over half of Canada’s IT security professionals aren’t very confident about their ability to defend against attacks – and 77 per cent of them aren’t getting the support they need from

Share on LinkedIn Comment on this article Share with Google+ Published on: June 5th, 2014 Candice So

How the cloud can improve security: Courtot

SAN FRANCISCO - After the warnings about the cloud and its potential threats to security, it seems counter-intuitive to say the cloud can actually help businesses shore up the security of their data.

Share on LinkedIn Comment on this article Share with Google+ Published on: February 27th, 2014 Candice So

10 security concerns for the public cloud: Russinovich

SAN FRANCISCO - It’s not news that businesses are moving more and more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a

Share on LinkedIn Comment on this article Share with Google+ Published on: February 27th, 2014 Candice So

Windows error reporting helps researchers uncover attacks

Windows Error Reporting, the program that sends details to Microsoft Corp. each time an application crashes or fails to update, helped researchers find evidence of attacks leveled against an unnamed government agency and

Share on LinkedIn Comment on this article Share with Google+ Published on: February 19th, 2014 Candice So

Securing your database is about more than just securing your network

If you run a business harbouring sensitive information within a database – anything from intellectual property, to digital cash, to your customers’ data – you need to secure it. It sounds like such

Share on LinkedIn Comment on this article Share with Google+ Published on: January 21st, 2014 Candice So

How did Snapchat get hacked?

Already, 2014 has started off with a data breach - on New Year's Day, Snapchat, a popular social network for photo messaging, fell victim to a hack attack. A website called SnapchatDB.info posted

Share on LinkedIn Comment on this article Share with Google+ Published on: January 3rd, 2014 Candice So

Do your PCs leak valuable intel with every Windows error report?

Anyone familiar with any version of Microsoft Windows is largely desensitized to the reality of occasional crashes. These range from process failures you never see to Windows Explorer shutdowns that cause all your

Share on LinkedIn Comment on this article Share with Google+ Published on: January 3rd, 2014 Claudiu Popa

Snapchat’s breach of trust: What’s the big deal?

Easily one of the most addictive time wasters ever to emerge from Silicon Valley, Snapchat has grown by leaps and bounds over the past two years.  Yet for anyone watching this juggernaut from

Share on LinkedIn Comment on this article Share with Google+ Published on: January 3rd, 2014 Claudiu Popa

Trend Micro’s 5 predictions for cybersecurity in 2014

Mobile banking heists, exploited vulnerabilities, and data breaches – these could be the cybersecurity hallmarks of 2014, according to a new report from security software provider Trend Micro Inc. In a report released

Share on LinkedIn Comment on this article Share with Google+ Published on: January 2nd, 2014 Candice So

Ron Deibert: Internet freedom comes down to a ‘clash of two world views’

For anyone following cybersecurity and digital privacy, 2013 has been a whirlwind. When former National Security Agency (NSA) contractor Edward Snowden took the lid off of U.S.’ cybersurveillance activities this past June, unleashing

Share on LinkedIn Comment on this article Share with Google+ Published on: December 17th, 2013 Candice So

How the City of Toronto tackles cybersecurity

In some ways, running a city is like running a business. There are costs and pressures, and there's also a pressing need to understand the way cybersecurity and cybercrime are changing. And for

Share on LinkedIn Comment on this article Share with Google+ Published on: November 27th, 2013 Candice So

Stealing credit card numbers from Apple point of sales terminals? Easier than you might think

With consumers forming snaking, long lines in stores before the holidays, businesses are adding more and more mobile terminals so their customers can buy directly from salespeople on the floor. This may speed

Share on LinkedIn Comment on this article Share with Google+ Published on: November 25th, 2013 Candice So