McAfee maps world’s riskiest Web domains

In the world of online search, just as in real estate, the mantra for safe bets is “location, location, location”, according to security experts from McAfee Inc., who recently mapped out the world's

Published on: November 2nd, 2010 Nestor Arellano

Spammers get the boot with Facebook’s new remote logout

Facebook users will soon have a new way of knocking spammers out of legitimate accounts.The social-networking company is rolling out a new security feature that lets users see which computers and devices are

Published on: September 7th, 2010 Robert McMillan

Spambot exploits iPhone 4 launch to infect thousands of sites

Did you recently receive an e-mail offering you a $50 voucher for iTunes? Don't touch it because very likely it's part of spambot scheme exploiting a Windows glitch and the iPhone 4 launch,

Published on: June 29th, 2010 Nestor Arellano

Automated security software brings respite to three-person IT dept

Automated security software for both file server and client machines brought much needed relief to harried IT staff at a Quebec farm equipment distributor.Instead of constantly "putting out fires", the trio -- who

Published on: June 22nd, 2010 Nestor Arellano

The Last Throes of Traditional Anti-Virus Software

It should come as no surprise to anyone that given the vast numbers of malicious software anti-virus companies are claiming to detect, the number of viruses out there is practically limitless. With the

Published on: May 11th, 2010 Claudiu Popa

Massive malware campaign exploits PDF flaw

Several security companies today warned of a major malware campaign that tries to dupe users into opening rigged PDFs that exploit an unpatched design flaw in the PDF. format Users who open the

Published on: April 30th, 2010 Gregg Keizer

‘Name to shame’ extortion scam targets adult game users

A Japanese cyber extortion gang is running a new "name to shame" scam by duping users who pirate adult games into installing malware, then demanding that they pay up to keep their names

Published on: April 20th, 2010 Gregg Keizer

Cyber attacks target sensitive data and specific individuals

Authorities in many countries are concerned that attacks on business and government resources will become the next battleground in cyber warfare. In the throne speech earlier this year, the Canadian government announced that

Published on: April 19th, 2010 ITBusiness Staff

Norton Internet Security offers top notch malware detection

Norton Internet Security 2010 has been investing in technology that detects malware by its behaviour, and it shows in this release, further bolstering this historically strong performer.The Norton Internet Security 2010 interface is

Published on: April 10th, 2010 Robert Vamosi

Business is booming in Canada’s riskiest online city

Location, location, location. If homeowners and businesses were to take a cue from the Norton Top 10 Riskiest Online Canadian Cities Report, Burlington might well be ghost town in a couple of months.

Published on: March 23rd, 2010 Nestor Arellano

Botnet toolkit lets hackers completely control compromised PCs

New capabilities are strengthening the ZeuS botnet, which criminals use to steal financial credentials and execute unauthorized transactions in online banking, automated clearing house (ACH) networks and payroll systems. The latest version of

Published on: March 15th, 2010 Ellen Messmer

Facebook — get your security act together, says frustrated expert

Dear Facebook,I appreciate your service. I really do. I'm sure that many of your 400 million active users appreciate it as well. But now that you have a market value estimated at billions

Published on: February 25th, 2010 Ira Winkler

Brutal botnet attack affects more than 75,000 computers

Security researchers at Herndon, Va.-based NetWitness Corp. have unearthed a massive botnet affecting at least 75,000 computers at 2,500 companies and government agencies worldwide. The Kneber botnet, named for the username linking the

Published on: February 19th, 2010 Jaikumar Vijayan

Countries may be ordering botnet attacks to confound enemies

Nations that want to disrupt their enemies' banking, media and government resources don't need their own technical skills; they can simply order botnets from cybercriminals.That's a point made in McAfee's new report "Virtually

Published on: November 18th, 2009 Ellen Messmer