HomeSecurity

Security

Cyber Centre again warns Canadian firms not to ignore cybercrime

Canada’s leading cybersecurity agency has again warned IT managers, corporate leaders and residents of the risks of not being prepared for cybercrime. In what it...

Privacy czars urge websites to block data scraping

Privacy and information commissioners from 12 jurisdictions including Canada, the U.K., China, and Australia have urged social media companies to do more to prevent...

Business email compromise scams getting more sophisticated: Report

Messaging scams that try to trick employees into performing risky transactions continue to dog organizations. In a report released today, Trustwave said a category of...

U.S. division of CIBC apparently sideswiped by MOVEit hack

Another Canadian bank’s U.S. division has apparently been sideswiped by the MOVEit file transfer server vulnerability. CIBC National Trust of Chicago, part of the Toronto-based...

Google to add more granular security controls to Workspace

Google will soon improve its automated AI-based data protection capabilities in its Workspace productivity suite for organizations storing data in Google Drive. The enhanced features...

LinkedIn collaborates with CLEAR to bring free identity verification to Canadian users

Professional social media platform LinkedIn is teaming up with CLEAR, a secure identity company, to introduce free identity verification services for its users in...

Former Tesla employees stole data of over 75,000 staff, company says

Over 75,000 current and former employees of car manufacturer Tesla are being notified their personal information was stolen in an insider data breach. Tesla notified...

Class action against Government of Canada advances following 2020 CRA privacy breach

The Federal Court of Canada has certified the class action filed against the Government of Canada over the spate of cyber incidents that took...

Cuba ransomware gang looking for unpatched Veeam installations: Report

The Cuba ransomware gang has tweaked its attack strategy to go after IT environments that haven’t patched a recently discovered vulnerability in Veeam Software’s...

Phishing campaign tries to evade defences with QR codes

Threat actors are still using QR codes in phishing campaigns to trick employees into downloading malware or revealing their credentials. The latest campaign included targeting...

Canadian marketing company hit by data breach, says Ontario liquor board

A Canadian marketing company that counts some of the country’s biggest corporations as its customers has been hit by a data breach. One of them...

The evolution of the workplace

  The next world of hybrid work is a three-part video series that examines the nature of the hybrid office, and the challenges—and advantages—associated with...

How the fledgling INC ransomware gang struck one victim

The new INC ransomware group took no more than a week — and possibly less — to enter and encrypt an organization’s IT systems,...

Scotiatrust US customers sideswiped by MOVEit hack

The U.S. investment advisory division of a Canadian-headquartered bank is among the latest companies to admit it was sideswiped by the exploitation of a...

Alberta dental plan administrator paid ransomware gang after attack

An agency that administers dental benefit plans for Alberta’s disabled children, seniors and low-income residents has paid the 8base ransomware gang an undisclosed amount...

Popular Posts

Security Blogs

Slideshows

How to equip students with the tools to succeed

Many teams used to spend the entire summer updating student devices. But now the Windows 10 ability to manage the devices without having to...

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy...

How upgrading your network can deliver a competitive advantage

In 2014, Gartner reported that the average cost of network downtime to an enterprise was $5,600 per minute. And even if the network isn't...

The top three network security challenges for 2016

Securing the network has always been a challenge, but it’s only getting more complex, thanks to the rise of cloud applications, programmable networks and...