What questions should we be asking about the eBay breach?

Shortly after the eBay press release hit the wire, the media started calling to ask for my feedback on the whys and the hows of this latest debacle. "Why did this happen?" "Why

Share on LinkedIn Comment on this article Share with Google+ Published on: May 21st, 2014 Claudiu Popa

SecureKey to provide MintChip digital currency with PIN

Toronto-based startup SecureKey Technologies Inc. is going to provide user authentication for the MintChip, the Royal Canadian Mint’s first foray into mobile payments. The startup will be building a security layer on top

Share on LinkedIn Comment on this article Share with Google+ Published on: February 20th, 2014 Candice So

HP updates Access Control to boost printer security

BOISE - With the huge influx of data in workplaces everywhere, Hewlett Packard Co. (HP) is ramping up security on its printers with another update to HP Access Control, its security solution for

Share on LinkedIn Comment on this article Share with Google+ Published on: November 14th, 2013 Candice So

Virtual currencies like Bitcoin help criminals launder money, McAfee report finds

With the rise of virtual currencies like Bitcoin and Second Life’s Linden dollars, it’s not just early adopters swapping their physical cash for Internet bits and bytes. A lot of criminals are taking

Share on LinkedIn Comment on this article Share with Google+ Published on: October 16th, 2013 Candice So

Practice good ‘password hygiene’ to avoid social media hi-jacking

Nearly one-third of Internet users stay logged into social media sites, leaving themselves open to attacks, according to a new study. In a voluntary survey of about 10,000 people worldwide, security software provider

Share on LinkedIn Comment on this article Share with Google+ Published on: May 7th, 2013 Candice So

Crowdfunding will grow and the PC will live: Deloitte’s 2013 predictions

We're coming to the end of the annual raft of year-ahead technology trend predictions, but Deloitte has their annual Technology, Media & Telecommunication predictions in under the wire and there are several that

Share on LinkedIn Comment on this article Share with Google+ Published on: January 15th, 2013 Jeff Jedras

What happens to cloud data when you die?

My guess is that, on average, we have at least 20 different online accounts.  At a minimum, this includes e-mail, social networking (e.g. Facebook, Twitter, LinkedIn, Youtube, MySpace, Flickr), entertainment (e.g. iTunes, Second

Share on LinkedIn Comment on this article Share with Google+ Published on: January 4th, 2013 ITBusiness Staff

Using Charles Dickens to crack your LinkedIn password

Kevin Young, a computer security expert who studies passwords, is nearly at a loss for words. Literally.Young and his colleagues are working to decode some 2.6 million scrambled LinkedIn passwords, part of a

Share on LinkedIn Comment on this article Share with Google+ Published on: June 8th, 2012 Jeremy Kirk

Web app checks for compromised LinkedIn passwords

A New York-based Web developer and his colleagues have built a Web-based application for people to see if their LinkedIn password hash is among 6.5 million released on a Russian hacker forum.The password

Share on LinkedIn Comment on this article Share with Google+ Published on: June 7th, 2012 Jeremy Kirk

6.5 million LinkedIn passwords hacked

LinkedIn users have been advised to change their passwords immediately after an unconfirmed report claimed that millions of 'unsalted' hashed passwords have turned up on a Russian hacker Web site.According to the Norwegian

Share on LinkedIn Comment on this article Share with Google+ Published on: June 7th, 2012 John E. Dunn

HTC scrambles to fix Android WiFi flaw

Some users of HTC Android phones will have to wait until next week to get a fix for a problem that could leak credentials used to gain access to Wi-Fi networks, including corporate

Share on LinkedIn Comment on this article Share with Google+ Published on: February 3rd, 2012 Tim Greene and Jared Newman

25 worst passwords of 2011

Internet users never learn. No matter how many times we hear about obvious, hackable passwords, people keep using them. And the situation doesn't seem to be getting better.Below is a list of the

Share on LinkedIn Comment on this article Share with Google+ Published on: November 21st, 2011 Jared Newman

10 identity management metrics that matter

Within the IT security community, identity- and access-management (IAM) initiatives are considered high value, but are notoriously problematic to deploy. Yet despite IAM's complexity, it represents 30 per cent or more of the

Share on LinkedIn Comment on this article Share with Google+ Published on: October 5th, 2011 Frank Villavicencio

Weak passwords the target of

A new Widows worm is working its way through company networks by taking advantage of weak passwords, security researchers said over the weekend. The worm, dubbed "Morto" by Microsoft and Helsinki-based F-Secure, has

Share on LinkedIn Comment on this article Share with Google+ Published on: August 30th, 2011 Gregg Keizer