Why data breaches keep happening

Target, Home Depot, and last week, Staples – it seems as though there are always new headlines cropping up about data breaches at major retailers or restaurants. For consumers, that can be worrying

Share on LinkedIn Comment on this article Share with Google+ Published on: October 27th, 2014 Candice So

Businesses’ chief security concern is data security: Kaspersky

Protecting data from being leaked or hacked – that’s the top security priority for businesses around the world, according to a new survey from Kaspersky Labs. In a survey released today, which Kaspersky

Share on LinkedIn Comment on this article Share with Google+ Published on: October 27th, 2014 Candice So

How to break into containerized Android apps

Chris John Riley can break into your phone. Well, that’s if you are running older versions of Box, LastPass, SpiderOak, Good for Enterprise, on Android. And Riley can do it all within less

Share on LinkedIn Comment on this article Share with Google+ Published on: October 23rd, 2014 Candice So

Canadian businesses see dollar signs around Internet of Things trend

Canadian small to mid-sized businesses are more keen about the growing Internet of Things (IoT) industry than even their counterparts are, according to a new survey released on Wednesday by security vendor AVG

Share on LinkedIn Comment on this article Share with Google+ Published on: October 22nd, 2014 Brian Jackson

Don’t fear cloud computing, mobility, says Citrix security lead

Cloud computing and mobility have been in the headlines recently, but not for showing how enterprises use them for making huge productivity gains. Instead they’re signs for some of insecure systems thanks after

Share on LinkedIn Comment on this article Share with Google+ Published on: October 16th, 2014 Howard Solomon

New bug in Linux and Mac OS X could be worse than Heartbleed

Security experts are flagging a new bug in Bash, a type of popular Linux software, saying it could be more dangerous to users than Heartbleed. Bash, which is used to control the command

Share on LinkedIn Comment on this article Share with Google+ Published on: September 25th, 2014 Candice So

3 in 10 Canadians not protecting themselves online, survey finds

When it comes to protecting ourselves online, Canadians are not the most savvy bunch in the world – in fact, we commit a lot of cardinal security sins, like sharing passwords, connecting to

Share on LinkedIn Comment on this article Share with Google+ Published on: September 23rd, 2014 Candice So

ITBusiness.ca to collaborate with Global Finance Conference

There was a time when what technology a company used was solely the concern of the IT department. But now it's a part of everyone's job to know what the latest technology is

Share on LinkedIn Comment on this article Share with Google+ Published on: September 3rd, 2014 Brian Jackson

Facebook patching vulnerability that could force iPhones to make calls

For iPhone users, there's definitely some convenience in being able to just tap a phone number, kickstarting a prompt that will ask whether they'd like to call it. However, there's some danger in

Share on LinkedIn Comment on this article Share with Google+ Published on: August 25th, 2014 Candice So

Symantec to pull Norton products together into one cloud-based suite

Symantec Corp. is going to be revamping its Norton product line this week, replacing its line of security products with one cloud-based suite. On Wednesday, Symantec announced it was going to be pulling

Share on LinkedIn Comment on this article Share with Google+ Published on: August 22nd, 2014 Candice So

Nuix’s data visualizations tool highlights security threats in graphic form

With all of the data constantly flooding our screens, sometimes we need ways to make sense of what we’re seeing. That’s where data visualizations can come in handy – and in an industry

Share on LinkedIn Comment on this article Share with Google+ Published on: August 19th, 2014 Candice So

Virtual currencies have to be regulated, says security expert

There's no shortage of people who have opinions on the virtual currency called Bitcoin. This week alone you could find a headline on Mashable that read, "Retailers Who Take Bitcoin Love It," while

Share on LinkedIn Comment on this article Share with Google+ Published on: August 7th, 2014 Howard Solomon

The three V’s of big data – and the security risks that come with it

We’ve been hearing the phrase “big data” being tossed around among companies, industries, and organizations for some time now – but what does it really mean? For Jerrard Gaertner, president of the Canadian

Share on LinkedIn Comment on this article Share with Google+ Published on: July 31st, 2014 Candice So

USB drives aren’t secure, researchers say

It's no big surprise USB drives can carry malware, or that they can infect our computers if we don't use antivirus software and reformatting to keep them malware-free. But those aren't the only

Share on LinkedIn Comment on this article Share with Google+ Published on: July 31st, 2014 Candice So