If you’re happy and you know it – so does airport security

Biometric technology involving facial recognition could soon be used to determine the moods of people in public and alert security about angry or suspicious expressions, according to research out of Concordia University.A researcher

Published on: December 5th, 2008 Brian Jackson

Holiday shopping at work could harm far more than your productivity

As Canadians and Americans become more concerned about the price of presents this year, they are increasingly flocking to the Internet for better deals, special online discounts and gas-saving benefits. According to a

Published on: December 4th, 2008 Michelle MacLeod

After brief respite beastly botnets are “back with a vengeance”

Two weeks after a hosting firm's shutdown sent global spam volumes plummeting, some researchers say spam has already bounced back.The shutdown of California-based McColo Corp., a company that hosted a staggering variety of

Published on: November 27th, 2008 Gregg Keizer

Security, Search reasons to not skip Vista

It's been a hard road for Microsoft's Windows Vista, but even though negative perceptions have followed the operating system since its release, recent data and positive user feedback show a glimmer of hope

Published on: November 21st, 2008 Jeff Radecki

Five mistakes to avoid for better mobile phone security

Mobile devices get smarter every day, and more of us than ever depend on them. But there is a drawback to our increasing dependence on smart mobile devices--they have the potential to be

Published on: November 21st, 2008 Matt Bancroft

Smartphones: the next target of malware attacks

Four years ago, F-Secure Chief Research Officer Mikko Hypponen was talking about malware infections on mobile phones while few others were paying attention. With the growing use of Internet-enabled phones, particularly Apple's iPhone

Published on: November 13th, 2008 Bill Brenner

Firms that cut jobs to cope with recession “face security risks”

With a faltering economy resulting in increased jobs cuts and corporate belt tightening, security analysts are warning companies to be especially vigilant about protecting their data and networks against disgruntled employees.As it is,

Published on: November 3rd, 2008 Jaikumar Vijayan

Get that chip off your shoulder and put it on your credit card

Chip-enabled credit and debit cards will almost entirely replace magnetic strip cards within the next five years – perhaps sooner, e-payment experts say. Vastly improved security will be the most tangible impact of

Published on: October 31st, 2008 Kavita Gosyne

Spammers step up “hit-and-run” operations

They were all the rage last year, but image and file attachment spam is definitely out in 2008, as spammers abandon complex techniques for simpler URL-based methods.Around 90 per cent of all spam

Published on: July 31st, 2008 Nestor Arellano

Apple slammed for leaving DNS flaw unpatched

Apple Inc. has not yet patched a critical Domain Name System (DNS) bug in its Mac OS Xoperating system, analysts and security researchers noted today as some criticized the company for dragging its

Published on: July 31st, 2008 Gregg Keizer

Colorado Spam King found dead

Convicted penny-stock spammer Eddie Davidson has died of a self-inflicted gunshot wound, apparently after killing his wife and 3-year-old daughter in his home town of Bennet, Colorado, the U.S. Department of Justice said

Published on: July 28th, 2008 Robert MacMillan

SMBs lulled into false sense of online security

A majority of small to medium-size businesses in North America mistakenly assume that they are too low a target for cyber crooks, but a new survey indicates that the sector is in fact

Published on: July 24th, 2008 Nestor Arellano

Dealing with bunglers and prima donnas on your IT security staff

Think your security staffers are trustworthy? Competent? Knowledgeable? Ask a security professional for horror stories and you might think again.Here's one from Kevin McDonald, executive vice president at managed services provider Alvaka Networks,

Published on: July 22nd, 2008 Lisa Vaas

Google Desktop, Word may expose encrypted data

If you're using encryption software to keep part of your computer's hard drive private, you may have a problem, according to researchers at the University of Washington and British Telecommunications.They've discovered that popular

Published on: July 17th, 2008 Robert MacMillan