Virtual currencies have to be regulated, says security expert

There's no shortage of people who have opinions on the virtual currency called Bitcoin. This week alone you could find a headline on Mashable that read, "Retailers Who Take Bitcoin Love It," while

Share on LinkedIn Comment on this article Share with Google+ Published on: August 7th, 2014 Howard Solomon

The three V’s of big data – and the security risks that come with it

We’ve been hearing the phrase “big data” being tossed around among companies, industries, and organizations for some time now – but what does it really mean? For Jerrard Gaertner, president of the Canadian

Share on LinkedIn Comment on this article Share with Google+ Published on: July 31st, 2014 Candice So

USB drives aren’t secure, researchers say

It's no big surprise USB drives can carry malware, or that they can infect our computers if we don't use antivirus software and reformatting to keep them malware-free. But those aren't the only

Share on LinkedIn Comment on this article Share with Google+ Published on: July 31st, 2014 Candice So

New variant of malware, Gyges, can quietly exfiltrate government data

There’s a new piece of malware targeting government organizations – and according to the security researchers who unearthed it, it’s basically invisible and can avoid being detected for a long period of time.

Share on LinkedIn Comment on this article Share with Google+ Published on: July 18th, 2014 Candice So

Half of security professionals want more from vendors, survey says

Half of Canada’s IT security professionals are disappointed in the technology they pay for, feeling it doesn’t keep their organizations’ data safe enough, according to a new survey sponsored by Websense Inc. and

Share on LinkedIn Comment on this article Share with Google+ Published on: July 17th, 2014 Candice So

Trustwave promises customers zero malware with new offering

U.S.-based security solutions provider Trustwave Holdings Inc. is launching a new managed services offering – and it’s promising that businesses that sign up for it will never get infected with malware. Trustwave’s new

Share on LinkedIn Comment on this article Share with Google+ Published on: July 15th, 2014 Candice So

Hackers turning to Microsoft Office to attack users

It may have been a while since you’ve seen the viruses that once were a risk to Microsoft Word and Excel users in the 1990s. As threatening flaws in the programming language for

Share on LinkedIn Comment on this article Share with Google+ Published on: July 8th, 2014 Candice So

IT managers avoiding unlicensed software for security reasons, BSA says

Among business owners, one of the biggest concerns of using unlicensed software is the chance of installing malware through an unpatched, unsafe version of the software, according to a new survey from the

Share on LinkedIn Comment on this article Share with Google+ Published on: July 2nd, 2014 Candice So

Hackers piggybacking off legitimate apps to install mobile malware

If you were desperate for another round of Flappy Bird and downloaded a clone of it, once the game’s creator took the original down, you may have downloaded malware as well, according to

Share on LinkedIn Comment on this article Share with Google+ Published on: June 26th, 2014 Candice So

AskMen.com sending visitors to download malware, Websense says

Updated on June 24, 2014 at 4:50pm ET to reflect comments from AskMen.com. Hackers have compromised AskMen.com, a men’s interest website on dating, celebrity news, and health – and they could be infecting

Share on LinkedIn Comment on this article Share with Google+ Published on: June 24th, 2014 Candice So

How Cryptolocker and ransomware take data hostage

From “software leases” to Cryptolocker, ransomware has been around for a while – but criminals are now taking victims’ data hostage as a way to make money, moving to mobile devices and other

Share on LinkedIn Comment on this article Share with Google+ Published on: June 19th, 2014 Candice So

New PCI standard disappointing, Toronto conference told

Every transaction system used by a North American business that uses credit cards has to follow the Payment Card Industry (PCI)'s standards. But against the background of continuing breaches at retailers,the PCI’s latest

Share on LinkedIn Comment on this article Share with Google+ Published on: June 18th, 2014 Andrew Brooks

New security service makes Java apps ‘self-healing’

A Dublin-based security vendor is offering a new cloud-based service to offer a new type of Java application server that protects itself from cyber-security theats. Waratek's Java Application Security product promises to monitor,

Share on LinkedIn Comment on this article Share with Google+ Published on: June 12th, 2014 Brian Jackson

CIRA calls on Canadian website owners to help improve .ca security

Canadian domain registrars should take action to implement a secure domain layer in order to help web surfers avoid phishing attacks and other fraud, says the Canadian Internet Registration Authority. The non-profit organization

Share on LinkedIn Comment on this article Share with Google+ Published on: June 11th, 2014 Brian Jackson