Snapchat’s breach of trust: What’s the big deal?

Easily one of the most addictive time wasters ever to emerge from Silicon Valley, Snapchat has grown by leaps and bounds over the past two years.  Yet for anyone watching this juggernaut from

Published on: January 3rd, 2014 Claudiu Popa

Did the NSA Deal Fatally Damage the RSA Brand?

Secrecy is not a poor security practice as much as a compromise of integrity. EMC's RSA Security division recently made headlines when its enterprise products were expertly hacked, undermining the security of thousands of

Published on: December 23rd, 2013 Claudiu Popa

Three thoughts for IT security professionals, from SecTor’s G. Mark Hardy

For IT professionals, the security landscape is constantly changing, with new threats regularly cropping up and new ways of combating cybercrime trying to keep up. Yesterday, cyber security expert G. Mark Hardy delivered

Published on: October 9th, 2013 Candice So

Canadians have ‘naive belief’ hackers won’t target them: Trustwave

Small businesses worried about their IT need to find better ways to guard their data – especially as they present easy, unsecured targets, with hackers levelling their sights at them. Contrary to what

Published on: October 8th, 2013 Candice So

Spear phishing so effective its scary [infographic]

If Moby Dick were written today, Ishmael might be a social engineering-hacker instead of a sailor and Moby Dick might be a corporate CEO instead of a sperm whale. That's because spear phishing

Published on: May 23rd, 2013 Brian Jackson

Sophisticated ‘Elderwood’ hackers targeting defence industry, Symantec warns

A group of highly skilled and organized attackers, likely backed by some serious computing power, have been conducting targeted attacks against North America’s defence industry supply chain for the past three years, according

Published on: September 7th, 2012 Brian Jackson

Experts warn of new Dirt Jumper botnet that crippled Krebs site

The baddies behind the Dirt Jumper malware have unleashed a new threat called Pandora and even cybersecurity experts like Brian Krebs aren't immune to variations of the nasty botnet, a U.S. security firm

Published on: August 14th, 2012 ITBusiness Staff

CloudFlare opens new data centre to grease pipes on Canadian Web traffic

Content delivery network CloudFlare announced the opening of its first Canadian data centre in Toronto yesterday, placed to address the growing amount of Web traffic seen originating from Canada.CloudFlare offers Web site performance

Published on: July 31st, 2012 Brian Jackson

Size doesn’t matter when it comes to protecting against online attacks

Lately it seems rare to read a technology section and not see a story about a targeted online security attack. With Stuxnet, Duqu and now Flamer making big headlines, targeted attacks have become

Published on: July 17th, 2012 Paul Wood

German researchers say they found flaws in Amazon Web Servicesthat they believe exist in many cloud architectures and enableattackers to gain administrative rights and to gain access to all userdata.While the researcherssay they

Published on: October 27th, 2011 Tim Greene

VoIP attacks on the rise?

In its recent annual security report, Cisco predicted VoIP (Voice over Internet Protocol) abuse as a potential area for cyber crime growth."Criminals use brute-force techniques to hack private branch exchange (PBX) systems to

Published on: March 9th, 2011 Joan Goodchild

Anonymous ‘warring with God’ says hacked church

A Twitter message from Monday suggests that a self-proclaimed "hacktivist" using the handle The Jester may have been responsible for knocking the controversial Westboro Baptist Church offline . In the message , the

Published on: February 24th, 2011 Jaikumar Vijayan

Six security risks SMBs need to guard against

Social media networks and mobile devices top the list of six security risks that small and medium sized businesses (SMBs) need to focus on, according to security experts. The mad rush for businesses

Published on: January 6th, 2011 Nestor Arellano

Operation: Payback attacks can be tracked down

People using a tool to conduct distributed denial-of-service (DDOS) attacks against other websites in support of WikiLeaks can easily be traced, according to computer security researchers.Thousands of people have downloaded the "Low Orbit

Published on: December 14th, 2010 Jeremy Kirk