10 security concerns for the public cloud: Russinovich

SAN FRANCISCO - It’s not news that businesses are moving more and more of their data to the cloud. But even as cloud storage and computing have hit the mainstream, there are a

Share on LinkedIn Comment on this article Share with Google+ Published on: February 27th, 2014 Candice So

Windows error reporting helps researchers uncover attacks

Windows Error Reporting, the program that sends details to Microsoft Corp. each time an application crashes or fails to update, helped researchers find evidence of attacks leveled against an unnamed government agency and

Share on LinkedIn Comment on this article Share with Google+ Published on: February 19th, 2014 Candice So

Securing your database is about more than just securing your network

If you run a business harbouring sensitive information within a database – anything from intellectual property, to digital cash, to your customers’ data – you need to secure it. It sounds like such

Share on LinkedIn Comment on this article Share with Google+ Published on: January 21st, 2014 Candice So

How did Snapchat get hacked?

Already, 2014 has started off with a data breach - on New Year's Day, Snapchat, a popular social network for photo messaging, fell victim to a hack attack. A website called SnapchatDB.info posted

Share on LinkedIn Comment on this article Share with Google+ Published on: January 3rd, 2014 Candice So

Do your PCs leak valuable intel with every Windows error report?

Anyone familiar with any version of Microsoft Windows is largely desensitized to the reality of occasional crashes. These range from process failures you never see to Windows Explorer shutdowns that cause all your

Share on LinkedIn Comment on this article Share with Google+ Published on: January 3rd, 2014 Claudiu Popa

Snapchat’s breach of trust: What’s the big deal?

Easily one of the most addictive time wasters ever to emerge from Silicon Valley, Snapchat has grown by leaps and bounds over the past two years.  Yet for anyone watching this juggernaut from

Share on LinkedIn Comment on this article Share with Google+ Published on: January 3rd, 2014 Claudiu Popa

Trend Micro’s 5 predictions for cybersecurity in 2014

Mobile banking heists, exploited vulnerabilities, and data breaches – these could be the cybersecurity hallmarks of 2014, according to a new report from security software provider Trend Micro Inc. In a report released

Share on LinkedIn Comment on this article Share with Google+ Published on: January 2nd, 2014 Candice So

Ron Deibert: Internet freedom comes down to a ‘clash of two world views’

For anyone following cybersecurity and digital privacy, 2013 has been a whirlwind. When former National Security Agency (NSA) contractor Edward Snowden took the lid off of U.S.’ cybersurveillance activities this past June, unleashing

Share on LinkedIn Comment on this article Share with Google+ Published on: December 17th, 2013 Candice So

How the City of Toronto tackles cybersecurity

In some ways, running a city is like running a business. There are costs and pressures, and there's also a pressing need to understand the way cybersecurity and cybercrime are changing. And for

Share on LinkedIn Comment on this article Share with Google+ Published on: November 27th, 2013 Candice So

Stealing credit card numbers from Apple point of sales terminals? Easier than you might think

With consumers forming snaking, long lines in stores before the holidays, businesses are adding more and more mobile terminals so their customers can buy directly from salespeople on the floor. This may speed

Share on LinkedIn Comment on this article Share with Google+ Published on: November 25th, 2013 Candice So

File sharing apps full of security flaws – even from Apple App Store

A file sharing application may be a quick and handy way to get a file from point A to point B – but it may also be riddled with gaping security holes, according

Share on LinkedIn Comment on this article Share with Google+ Published on: November 25th, 2013 Candice So

Websense Triton looks to intercept targeted cyber attacks

Cybercriminals continue to get more sophisticated and this has led to more successful luring of victims. San Diego-based Websense, Inc. is addressing this concern with its updated Triton defense version 7.8 that attempts to quell

Share on LinkedIn Comment on this article Share with Google+ Published on: November 12th, 2013 Paolo Del Nibletto

Security experts debate use of backdoors in coding

In light of the furore around the NSA and PRISM, a new report from the Citizen Lab is calling for a cut down on the use of backdoors when coding software. In his

Share on LinkedIn Comment on this article Share with Google+ Published on: November 7th, 2013 Candice So

Virtual currencies like Bitcoin help criminals launder money, McAfee report finds

With the rise of virtual currencies like Bitcoin and Second Life’s Linden dollars, it’s not just early adopters swapping their physical cash for Internet bits and bytes. A lot of criminals are taking

Share on LinkedIn Comment on this article Share with Google+ Published on: October 16th, 2013 Candice So