Articles By Ellen Messmer

Heat intensifies in Flame malware probe

With Iran's computer-emergency response centre now decrying Windows-based cyber-espionage software known as Flame (or alternately Flamer or Skywiper) it says it discovered infecting its oil-ministry computers, the uproar is reaching into the United

Published on: May 30th, 2012 Ellen Messmer

Consumer Reports: skip commercial anti-malware software, freeware is good enough

In what could be regarded as a controversial test of anti-malware effectiveness, the influential Consumer Reports publication in its June issue gives its main recommendation to anti-malware freeware for protecting Windows and Mac

Published on: May 30th, 2012 Ellen Messmer

Move over Anonymous, make way for The Unknowns

The latest shadowy hacker group to strike is calling itself The Unknowns, and they're bragging they've hacked NASA Glenn Research Center, the U.S. Air Force, the European Space Agency and others, posting some

Published on: May 3rd, 2012 Ellen Messmer

Investigators probe Visa, MasterCard data breach

A massive data breach of a payment-card processor's network could involve more than 10 million compromised card numbers, according to security news writer Brian Krebs in his online posting today.The name of the

Published on: March 30th, 2012 Ellen Messmer

Report says malware attacks zeroing in on Canada, U.S.

In its annual review of global security threats, Websense Inc., says a major trend it observed last year is that more malware connections, hosting and phishing appear to be occurring in the United

Published on: March 29th, 2012 Ellen Messmer

Okta enables cloud-based single sign-on for Xerox Canada

As companies sort out their cloud strategies, some are finding cloud-based single sign on (SSO) can be a high-tech "perk" for customers.Canadian package-delivery service Purolator Inc., had that in mind when it made

Published on: March 22nd, 2012 Ellen Messmer

Interview at least one woman for IT job: advocacy group

A not-for-profit group advocating there be more women working in information technology has just published a report that says recruiters for high-tech jobs should make sure there is at least one woman candidate

Published on: March 8th, 2012 Ellen Messmer

World’s leading Web brands team up with banks to end phishing scams

Can industry heavyweights Google, PayPal, Microsoft and AOL -- along with 11 others in high-tech such as Facebook and LinkedIn, as well as the financial world's Bank of America and Fidelity Investments --

Published on: January 30th, 2012 Ellen Messmer

Microsoft to start auto updates of Internet Explorer

Microsoft next year will change its automated update process for the Internet Explorer (IE) Web browser to push out the latest version of the browser for XP, Vista and Windows 7 without the

Published on: December 16th, 2011 Ellen Messmer

Worries over Patriot Act drives NDP to cloud encryption

Canada's main opposition party is using cloud-based Salesforce.com in the U.S. to store information about voters and interact with them, but worries that U.S. government snoops could peek at sensitive information under U.S.

Published on: September 27th, 2011 Ellen Messmer

PlayStation network hack results in massive-scale identity theft

The massive Sony PlayStation Network data breach that exposed personal and password information -- and possibly credit cards -- of an estimated 77 million people is an identity-theft bonanza."This is a gold mine

Published on: April 28th, 2011 Ellen Messmer

McAfee hackers break U.S. law, vow to continue doing so

The hacker group that exposed holes in McAfee's Web site knows it's breaking U.S. law, but vows to continue exposing vulnerabilities, especially on security vendor Web sites. "We do understand performing security testings without authorization

Published on: March 31st, 2011 Ellen Messmer

What you should know about the RSA SecurID breach

RSA's disclosure last Thursday that it has suffered a sophisticated cyberattack in which attackers obtained some type of information about RSA's SecurID product for two-factor authentication is prompting a variety of suggestions in

Published on: March 21st, 2011 Ellen Messmer

Should you strike back against cyber attackers?

Should revenge assaults be just another security tool large IT shops use to counter cyber attacks? It's a controversial idea, and the law generally frowns on cyber attacks in general, but at the

Published on: January 24th, 2011 Ellen Messmer

Chrome, Safari, MS Office top ‘dirty dozen’ list

The Google Chrome browser has earned the dubious distinction of being named the most vulnerable application on the "Dirty Dozen" list of 12 applications with the most discovered software flaws requiring security updates

Published on: November 17th, 2010 Ellen Messmer