One shared database in security’s future: Trilling

SAN FRANCISCO – With all the weekly headlines about new malware, dangerous threats, and unforeseen attack vectors, it might be easy to believe that hackers will soon be the victors of the cybersecurity

Share on LinkedIn Comment on this article Share with Google+ Published on: February 27th, 2014 Candice So

Websense Triton looks to intercept targeted cyber attacks

Cybercriminals continue to get more sophisticated and this has led to more successful luring of victims. San Diego-based Websense, Inc. is addressing this concern with its updated Triton defense version 7.8 that attempts to quell

Share on LinkedIn Comment on this article Share with Google+ Published on: November 12th, 2013 Paolo Del Nibletto

Cyber-security predictions for 2013

With the end of 2012 fast approaching, security software vendors are gazing into their crystal balls to predict what the threat landscape will look like in 2013.While obviously flipping another page in a

Share on LinkedIn Comment on this article Share with Google+ Published on: November 13th, 2012 Brian Jackson

Avast Free Mobile Security secures Android phones

Avast Software has launched a free Android security product that combines antivirus, anti-theft and firewall components and provides special features for rooted devices.Avast Free Mobile Security supports a number of features that are

Share on LinkedIn Comment on this article Share with Google+ Published on: December 23rd, 2011 Jon L. Jacobi

ClamAV offers businesses free, cloud-based antivirus

Most of us don't like paying for antivirus (AV) software, but at least home users can rely on one of the free options, such as Microsoft Security Essentials, avast!, or AVG Free. However,

Share on LinkedIn Comment on this article Share with Google+ Published on: January 19th, 2011 Keir Thomas

Foreign spies have already hacked your systems

Is your company's data under surveillance by foreign spybots looking for any competitive advantages or weaknesses they can exploit? This might sound farfetched, but such electronic espionage is real. It's an insidious security

Share on LinkedIn Comment on this article Share with Google+ Published on: July 27th, 2010 Bob Violino

Retailers’ systems assailed by older, overlooked security flaws

An overemphasis on tackling new and emerging security threats may be causing companies to overlook older but far more frequently exploited vulnerabilities, according to a recent report. The report, from Trustwave, h is

Share on LinkedIn Comment on this article Share with Google+ Published on: February 4th, 2010 Jaikumar Vijayan

Twitter, Chrome OS, HTML 5 — top attack targets this year

Popular social networking sites such as Twitter and Facebook, Google's Web-based Chrome operating system, and the updated HTML 5 (hyper text markup language), are prime targets for cyber attacks in 2010, says a

Share on LinkedIn Comment on this article Share with Google+ Published on: January 7th, 2010 Nestor Arellano

Ten ways hackers can breach your system and how you can fight back

Several worrying news stories have emerged over the last couple of years indicating that not only are relatively well protected companies at risk, but that highly publicised attacks may be the tip of

Share on LinkedIn Comment on this article Share with Google+ Published on: July 28th, 2009 Danny Bradbury


Top five ways Canadians can protect against credit fraud

Each year thousands of Canadians fall victim to identity theft, and in a variety of ways.It could be by them misplacing personal information, having their wallets swiped, mistakenly giving out credit card numbers

Share on LinkedIn Comment on this article Share with Google+ Published on: November 6th, 2008 Michelle MacLeod

Five easy ways to burglar-proof your laptop

Theft of laptops and other mobile devices is spiraling, and the consequences – financial and other – are getting increasingly dire.These two disconcerting realities are attested to by survey findings from a range

Share on LinkedIn Comment on this article Share with Google+ Published on: June 4th, 2008 Nestor Arellano

New EMC appliance blends storage and security features

A recently launched software package that integrates data storage with encryption and key management technologies may be a good option for companies looking for a single device that combines these capabilities, industry insiders

Share on LinkedIn Comment on this article Share with Google+ Published on: April 20th, 2008 Nestor Arellano

Malware threats have more than quadrupled

There was an explosion in the number of malicious attacks in 2007 conducted largely through exploits on social networking Web sites and browser plug-ins, according to Symantec Canada Corp. The computer security vendor

Share on LinkedIn Comment on this article Share with Google+ Published on: April 8th, 2008 Brian Jackson