File sharing apps full of security flaws – even from Apple App Store

A file sharing application may be a quick and handy way to get a file from point A to point B – but it may also be riddled with gaping security holes, according

Published on: November 25th, 2013 Candice So

Live stream – Technicity 2013: Focus on cybersecurity

Watch here live now: for our all-day conference live video feed and follow along on Twitter at #Technicity2013. You can check the agenda here. Join the conversation on Twitter: Tweets about "#Technicity2013" // As

Published on: November 25th, 2013 Brian Jackson

The end of Windows XP: What are your options?

I recently participated in a Twitter chat (#CDNwinXP) with regard to the Windows XP operating system reaching end of support in April 2014. As I write this post, I am returning from a

Published on: November 25th, 2013 Brian Bourne

8 Toronto cyber-security experts you should know

Published on: November 13th, 2013 Brian Jackson

Security experts debate use of backdoors in coding

In light of the furore around the NSA and PRISM, a new report from the Citizen Lab is calling for a cut down on the use of backdoors when coding software. In his

Published on: November 7th, 2013 Candice So

Adobe Creative Cloud allows for faster upgrades, more access

With the rollout of Adobe Systems Inc.'s Creative Cloud over the past few months, small to mid-sized businesses (SMBs) and consumers have had more access to creative editing tools than ever. In May,

Published on: October 21st, 2013 Candice So

Virtual currencies like Bitcoin help criminals launder money, McAfee report finds

With the rise of virtual currencies like Bitcoin and Second Life’s Linden dollars, it’s not just early adopters swapping their physical cash for Internet bits and bytes. A lot of criminals are taking

Published on: October 16th, 2013 Candice So

Building a spy phone is as easy as injecting malware into Android apps

Kevin McNamee stands in front of his laptop on a low stage, a phone in his hand as he scrolls through a program showing his phone’s screen, magnified on a projector screen beside

Published on: October 10th, 2013 Candice So

Three thoughts for IT security professionals, from SecTor’s G. Mark Hardy

For IT professionals, the security landscape is constantly changing, with new threats regularly cropping up and new ways of combating cybercrime trying to keep up. Yesterday, cyber security expert G. Mark Hardy delivered

Published on: October 9th, 2013 Candice So

Canadians have ‘naive belief’ hackers won’t target them: Trustwave

Small businesses worried about their IT need to find better ways to guard their data – especially as they present easy, unsecured targets, with hackers levelling their sights at them. Contrary to what

Published on: October 8th, 2013 Candice So

Dell offering tool for SMBs to migrate away from Windows XP

As the day marking the end of Windows XP support looms ahead, Dell Inc. has launched a new program for small to mid-sized businesses (SMBs) looking to migrate away from the outdated operating

Published on: October 7th, 2013 Candice So

Adobe’s server hacked, making data of 2.9 million customers accessible

Adobe Systems Inc. is reporting one of its servers has been hacked, with attackers getting a look at the customer IDs and encrypted passwords of as many as 2.9 million users. In a

Published on: October 4th, 2013 Candice So

Cisco issues 10 security fixes for networking hardware

Mid-sized businesses that rely on Cisco's networking hardware running on IOS will want to check and see if they are affected by one of 10 vulnerabilities that could expose them to a denial-of-service

Published on: September 27th, 2013 Brian Jackson

Symantec updates Norton product line to penalize bad behaviour

As children across the country are headed back to class this week, teachers will be on the lookout for early signs of which students will be trouble over the course of the year

Published on: September 4th, 2013 Brian Jackson