Do your PCs leak valuable intel with every Windows error report?

Anyone familiar with any version of Microsoft Windows is largely desensitized to the reality of occasional crashes. These range from process failures you never see to Windows Explorer shutdowns that cause all your

Published on: January 3rd, 2014 Claudiu Popa

Snapchat’s breach of trust: What’s the big deal?

Easily one of the most addictive time wasters ever to emerge from Silicon Valley, Snapchat has grown by leaps and bounds over the past two years.  Yet for anyone watching this juggernaut from

Published on: January 3rd, 2014 Claudiu Popa

Trend Micro’s 5 predictions for cybersecurity in 2014

Mobile banking heists, exploited vulnerabilities, and data breaches – these could be the cybersecurity hallmarks of 2014, according to a new report from security software provider Trend Micro Inc. In a report released

Published on: January 2nd, 2014 Candice So

Ron Deibert: Internet freedom comes down to a ‘clash of two world views’

For anyone following cybersecurity and digital privacy, 2013 has been a whirlwind. When former National Security Agency (NSA) contractor Edward Snowden took the lid off of U.S.’ cybersurveillance activities this past June, unleashing

Published on: December 17th, 2013 Candice So

How the City of Toronto tackles cybersecurity

In some ways, running a city is like running a business. There are costs and pressures, and there's also a pressing need to understand the way cybersecurity and cybercrime are changing. And for

Published on: November 27th, 2013 Candice So

Stealing credit card numbers from Apple point of sales terminals? Easier than you might think

With consumers forming snaking, long lines in stores before the holidays, businesses are adding more and more mobile terminals so their customers can buy directly from salespeople on the floor. This may speed

Published on: November 25th, 2013 Candice So

File sharing apps full of security flaws – even from Apple App Store

A file sharing application may be a quick and handy way to get a file from point A to point B – but it may also be riddled with gaping security holes, according

Published on: November 25th, 2013 Candice So

Websense Triton looks to intercept targeted cyber attacks

Cybercriminals continue to get more sophisticated and this has led to more successful luring of victims. San Diego-based Websense, Inc. is addressing this concern with its updated Triton defense version 7.8 that attempts to quell

Published on: November 12th, 2013 Paolo Del Nibletto

Security experts debate use of backdoors in coding

In light of the furore around the NSA and PRISM, a new report from the Citizen Lab is calling for a cut down on the use of backdoors when coding software. In his

Published on: November 7th, 2013 Candice So

Virtual currencies like Bitcoin help criminals launder money, McAfee report finds

With the rise of virtual currencies like Bitcoin and Second Life’s Linden dollars, it’s not just early adopters swapping their physical cash for Internet bits and bytes. A lot of criminals are taking

Published on: October 16th, 2013 Candice So

Building a spy phone is as easy as injecting malware into Android apps

Kevin McNamee stands in front of his laptop on a low stage, a phone in his hand as he scrolls through a program showing his phone’s screen, magnified on a projector screen beside

Published on: October 10th, 2013 Candice So

Three thoughts for IT security professionals, from SecTor’s G. Mark Hardy

For IT professionals, the security landscape is constantly changing, with new threats regularly cropping up and new ways of combating cybercrime trying to keep up. Yesterday, cyber security expert G. Mark Hardy delivered

Published on: October 9th, 2013 Candice So

Canadians have ‘naive belief’ hackers won’t target them: Trustwave

Small businesses worried about their IT need to find better ways to guard their data – especially as they present easy, unsecured targets, with hackers levelling their sights at them. Contrary to what

Published on: October 8th, 2013 Candice So

How did the Syrian Electronic Army hack the New York Times and Twitter?

It's beginning to read like a hit list - the Syrian Electronic Army (SEA) hacked The New York Times (NYT) and Twitter Inc. yesterday, adding the two high-profile sites to its list of

Published on: August 28th, 2013 Candice So