3 in 10 Canadians not protecting themselves online, survey finds

When it comes to protecting ourselves online, Canadians are not the most savvy bunch in the world – in fact, we commit a lot of cardinal security sins, like sharing passwords, connecting to

Published on: September 23rd, 2014 Candice So

Big increase in data breaches during 2012

We’ve heard a lot of anecdotal cases of password leaks and other data breaches from some high-profile services this year, but now software vendor SecurityCoverage is showing some research that indicates data breaches

Published on: August 23rd, 2012 Brian Jackson

Cloud security dos and don’ts after the latest Dropbox breach

The bottom line with free cloud-based storage services like Dropbox is that you get the type of security you pay for with them, a Toronto security expert warns. And since those services are

Published on: August 1st, 2012 Christine Wong

DataVault Password Manager for iOS devices

Your personal data can never be too secure, especially when it's on a device that's with you everywhere you go.DataVault Password Manager is a$10 app for both the iPhone and iPad that stores

Published on: January 19th, 2012 Kyle Baxter

International Zappos customer access blocked after data breach

Online shoe and apparel shop Zappos.com is advising over 24 million customers to change their passwords following a data breach, but its website is currently inaccessible to people outside the U.S.Zappos employees received

Published on: January 16th, 2012 Lucian Constantin

Hackers sharpen ‘spear phishing’ attacks for high profile targets

Recent break-ins at high-profile targets like the International Monetary Fund (IMF) demonstrate just how proficient hackers have become at "spear phishing," researchers said today."Today's spear phishing is not only more prevalent but also

Published on: June 14th, 2011 Gregg Keizer

How SMBs can prepare for a cyber attack

Wading into e-commerce waters can be scary for small businesses because of cybersecurity threats, but they can take steps to protect themselves, a group of security experts said Monday. Small businesses using the

Published on: May 17th, 2011 Grant Gross

Wireless network passwords cracked with Amazon’s EC2 service

German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses.Roth has created

Published on: January 11th, 2011 Keir Thomas

Popular hacked Gawker passwords include ‘password’

The most popular password among nearly 400,000 exposed by the Gawker hack was "12345," according to an analysis done by a security firm. In second place was the word "password" itself. The most

Published on: December 15th, 2010 Gregg Keizer

8 ways to improve your privacy while Web browsing

They say privacy doesn't exist on the Web -- but that doesn't mean you can't try to safeguard your personal information. Our computers are loaded with details about our personal and business lives,

Published on: September 24th, 2010 Logan Kugler

Five mistakes to avoid for better mobile phone security

Mobile devices get smarter every day, and more of us than ever depend on them. But there is a drawback to our increasing dependence on smart mobile devices--they have the potential to be

Published on: November 21st, 2008 Matt Bancroft

One in three IT admins pry into out-of-bounds information

One in three IT administrators say that they or one of their colleagues have used top-level admin passwords to pry into confidential or sensitive information at their workplaces, according to a survey by

Published on: June 24th, 2008 Gregg Keizer

Spam totally out of control, experts say

Although the motivation may be the same there's now very little to relate today's spammers to the original daddy of unsolicited e-mail, according to technology security experts.Some 30 years ago, Gary Thuerk, sent

Published on: May 9th, 2008 Nestor Arellano

Sweet-toothed employees willing to exchange passwords for candy

Is your network secure enough to fight off chocolate?The short answer: probably not. Even with all of the security-related news in recent years, Infosecurity Europe's now famous experiment (it just completed the sixth

Published on: April 21st, 2008 Mark Gibbs