Your headphones may be listening to you

Headphones: timeless, indispensable technology used across the globe for listening to music, making phone calls, and even as makeshift microphones, or... listening devices? A group of Israeli researchers at Ben Gurion University have

Published on: November 25th, 2016 Alex Radu

Why you should tell Siri to stop listening from your iPhone’s lockscreen

Most of us fear having our passwords compromised when we imagine being hacked - but real-life attackers can do plenty of damage with far less sensitive information. Case in point: The ease with

Published on: November 18th, 2016 Eric Emin Wood

The Ottawa River is about to be hacked and that’s a good thing

After Victoria Day weekend, most Canadians flock to lakes and rivers for summer activities such as swimming, boating, or fishing. But in Ottawa on May 30, more than a dozen teams will be

Published on: May 22nd, 2015 Brian Jackson

How to break into containerized Android apps

Chris John Riley can break into your phone. Well, that’s if you are running older versions of Box, LastPass, SpiderOak, Good for Enterprise, on Android. And Riley can do it all within less

Published on: October 23rd, 2014 Candice So

Critics of Microsoft’s XP patch decision fail to see the big picture

Punditry is a never ending race to distract and influence large audiences with antagonistic points of view put forward by quasi-intellectual iconoclasts. Often derided as irrelevant, the practice is alive and well in

Published on: May 5th, 2014 Claudiu Popa

Block hackers by learning the 7-step ‘kill chain’ method

Hackers and cybercriminals are becoming savvier, with the bulk of their attacks now aimed at specific targets, according to a new report from security solutions provider Websense Inc. Instead of launching Hail Mary-esque

Published on: April 2nd, 2014 Candice So

You can’t hack that: 4 ways to avoid an IT data breach

Companies have good reasons to fear data breaches. Whether it’s a single hacker targeting Twitter accounts with a phishing scheme or an orchestrated attack on a major U.S. retailer, sometimes it feels like

Published on: March 11th, 2014 Shawn Freeman

Bell customer data leak may lead to more phishing attacks

Bell Canada has suffered a breach of security. According to a company press release that blames an unspecified third party supplier in Ottawa, 22,421 user names and passwords and five valid credit card

Published on: February 3rd, 2014 Claudiu Popa

Millions of Target customers should expect a surprise in their inboxes

What was already a catastrophically large security breach became ridiculously monumental today as Target notified the public that an additional 30 million customers have been added to the previous total of 40 million

Published on: January 10th, 2014 Claudiu Popa

Did the NSA Deal Fatally Damage the RSA Brand?

Secrecy is not a poor security practice as much as a compromise of integrity. EMC's RSA Security division recently made headlines when its enterprise products were expertly hacked, undermining the security of thousands of

Published on: December 23rd, 2013 Claudiu Popa

Can a computer ever be secure enough for Grandma?

Has this ever happened to you? No matter where you are in your career, you still get unscheduled support calls from your mom, asking for help with her latest computer gremlin. I'm sure

Published on: December 16th, 2013 Claudiu Popa

Virtual currencies like Bitcoin help criminals launder money, McAfee report finds

With the rise of virtual currencies like Bitcoin and Second Life’s Linden dollars, it’s not just early adopters swapping their physical cash for Internet bits and bytes. A lot of criminals are taking

Published on: October 16th, 2013 Candice So

Lock picking, hacking, and dongles on the Sector show floor

In years of covering many technology conferences across North America, I have to say there are few exhibitor show floors as interesting as the one put on at Sector. Rather than the endless

Published on: October 10th, 2013 Brian Jackson

Three thoughts for IT security professionals, from SecTor’s G. Mark Hardy

For IT professionals, the security landscape is constantly changing, with new threats regularly cropping up and new ways of combating cybercrime trying to keep up. Yesterday, cyber security expert G. Mark Hardy delivered

Published on: October 9th, 2013 Candice So