HomeSecurity

Security

Canadian Cyber Centre now ranks threats with SecurityScorecard solution

The Canadian government’s cyber authority has started using a U.S. company’s security ratings platform to rank cyber threats to the country’s critical infrastructure. The Canadian...

Warning issued to admins of Ivanti Connect Secure and Policy Secure gateways

IT administrators with Ivanti’s  Connect Secure/Pulse Secure VPNs and Policy Secure gateways are urged to install mitigations immediately. The mitigations are to temporarily deal with...

Mandiant admits hacked X account didn’t have 2FA

Mandiant says the loss of control of its X/Twitter account last week was likely caused by a brute force password attack on one employee’s...

Impact of HPE’s US$14 billion buy of Juniper huge: Dell’Oro Group

Describing it as a “tectonic shift” for the networking industry, industry analyst Mauricio Sanchez has predicted that yesterday’s US$14 billion acquisition of Juniper Networks...

Warning: A fake ‘security researcher’ is trying to trick ransomware victims

Beware of so-called security researchers emailing firms that have been victimized by ransomware and claiming to be able to recover their stolen data. That’s the...

Female cyber pros group targeted in phishing scam

A threat actor is trying to con female cybersecurity pros into downloading malware. The warning comes from the Canadian-based Women CyberSecurity Society (WCS2), which says...

Many IT departments still don’t know how many APIs they have: Report

IT departments still don’t have an accurate count of the number of application programming interfaces (APIs) their app developers are putting into production, says...

Toronto Zoo hit by ransomware

The municipally-owned Toronto Zoo has been hit by a ransomware attack. The cyber attack was first detected early Friday, Jan. 5, the zoo said in...

NIST issues cybersecurity guide for AI developers

No foolproof method exists so far for protecting artificial intelligence systems from misdirection, warns an American standards body, and AI developers and users should...

Ontario healthcare providers now face possible fines for ‘severe’ data privacy violations

Healthcare providers covered by Ontario’s privacy law have an extra incentive to follow provincial data protection regulations: They now face administrative fines for serious...

Mandiant regains control of X/Twitter account

The X/Twitter account of Google’s Mandiant cybersecurity service has been taken over by a hacker who is seemingly promoting a cryptocurrency scam. The incident happened...

Canadian Senator temporarily loses control of X account

The office of Canadian Senator Amina Gerba has confirmed the Quebec parliamentarian’s account on the X/Twitter social media platform was hacked this week. Walter Calderon,...

Stolen Gold X accounts are increasingly being peddled on dark web, says report

Cybercrooks have increased the number of new or stolen Gold checkmarked accounts from the X/Twitter platform offered for sale; they are a valuable way...

Ban ransomware payments, Emsisoft urges governments

A major cybersecurity company is urging governments to forbid all organizations in their countries from paying ransomware gangs, arguing it would at least make...

Microsoft disables feature after abuse by threat actors

Application developers relying on Windows’ App Installer feature for distributing software over the web will have to find another vehicle, after Microsoft disabled a...

Popular Posts

Security Blogs

Slideshows

How to equip students with the tools to succeed

Many teams used to spend the entire summer updating student devices. But now the Windows 10 ability to manage the devices without having to...

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy...

How upgrading your network can deliver a competitive advantage

In 2014, Gartner reported that the average cost of network downtime to an enterprise was $5,600 per minute. And even if the network isn't...

The top three network security challenges for 2016

Securing the network has always been a challenge, but it’s only getting more complex, thanks to the rise of cloud applications, programmable networks and...