IT dept. ‘most likely’ to snoop on confidential company information

Businesses have gigabytes upon gigabytes of sensitive and confidential data archived on servers, storage arrays, or backup media. Those companies rely on the expertise of information security professionals to protect that data and

Published on: July 9th, 2010 Tony Bradley

8 amazing things you can do with Windows 8

Windows 8 is still a couple of years away, but Microsoft is already telling partners what to expect in the next generation operating system. Luckily for the public, Microsoft planning documents shared with

Published on: July 6th, 2010 Jon Brodkin

Google Street View snatch included passwords, e-mail

Wi-Fi traffic intercepted by Google's Street Viewcars included passwords and e-mail, according to the French National Commission on Computing and Liberty (CNIL).The Commission launched an investigation last month into Google's recording of traffic

Published on: June 22nd, 2010 Peter Sayer and Gregg Keizer

Several Mac apps tainted with password-stealing software

Intego, makers of security and privacy apps for the Mac, warned on Tuesday that some Mac software include a new piece of invasive spyware. Macworld has obtained a preliminary list of the applications

Published on: June 2nd, 2010 David Chartier

Public hotspots pose security pitfalls

Picture this: You're at a café with your laptop and latte in hand, getting ready to review new sales leads and the quarterly financial projections. First you hop on the free Wi-Fi that

Published on: April 20th, 2010

Boost productivity by banishing these 7 bad computing habits

You floss daily, rotate your tires regularly, file your taxes on time, and exercise at least twice a week. In other words, you have lots of good habits. But when it comes to

Published on: March 15th, 2010 Rick Broida

Hackers peddling stolen Twitter accounts for $1,000

According to researchers at Kaspersky Lab, cybercriminals are trying to sell hacked Twitter user names and passwords on-line for hundreds of dollars.Since 2005, the bad guys have been developing new data-stealing malware that

Published on: February 1st, 2010 Robert MacMillan and Gregg Keizer

5 most notorious data breaches of 2009

If there was anything even vaguely comforting about the data breaches that were announced this year, it was that many of them stemmed from familiar and downright mundane security failures. Companies continued to

Published on: December 18th, 2009 Jaikumar Vijayan

Security breach shuts down payroll service yet again

For the second time this month, PayChoice Inc., a large online provider of payroll processing services, has had to shut down its online portal because of a security breach.The company said its Online

Published on: October 20th, 2009 Jaikumar Vijayan

Domino’s ‘loses’ $77,000 in free pizza after promo code hacked

Domino's Pizza lost about $77,000 in free pizza due to a weak password on an online promotion that wasn't supposed to go live -- a type of security problem that is all too

Published on: July 29th, 2009 Tim Greene

Five ways employees spill company secrets

A company can buy every top-of-the-line security product known to man, but it won't make a difference for data loss prevention (DLP) unless end users are educated on their own role. Technology is

Published on: July 15th, 2009 Bill Brenner

What hackers want today and how to foil them

While data breaches have multiplied, research suggests many Canadian businesses aren't fully equipped to deal with the heightened threat. Seventy per cent of businesses polled in a recent survey consider security a "Top

Published on: February 24th, 2009 Michelle MacLeod

10 New Year’s Resolutions for Your Business

The problems won't go away on their own, though. If you need help compiling a list of what you have to accomplish, here are our top ten New Year's resolutions that you can

Published on: January 26th, 2009 Christopher Null

Five fantastic tools for password freedom

Password managers are a huge help in dealing with our exponentially growing numbers of accounts. But stand-alone apps introduce a new problem: If you aren't sitting at the PC with the software installed,

Published on: October 7th, 2008 Eric Larkin