Hashtag Trending – Equifax mistakes, Google-HTC deal, headphones with AI

Equifax’s bad luck streak isn’t over yet. Google’s deal with HTC means the maker of Android is serious about hardware. And Bose has a new headset integration with Google Assistant. For weeks, Equifax

Published on: September 22nd, 2017 Brian Jackson

Why it’s dangerous to Google Shawn Mendes or Justin Bieber

Each year McAfee produces a list of the world’s most dangerous cyber celebrities. You may remember actresses such as Lily Collins (pop star Phil Collins' daughter) and Emma Watson taking top spot in past years.

Published on: September 21st, 2017 ITBusiness Staff

Google blocks fast-moving fake Google Docs scam

Google says it's disabled the accounts sending out a convincing fake Google Docs invitation in a widespread phishing scam that hit inboxes around the world yesterday. "We have taken action to protect users

Published on: May 4th, 2017 Brian Jackson

Beware of this sophisticated Gmail phishing scam

Google Inc. is warning Gmail users to activate two-step verification to protect their accounts after the discovery of what is being called a highly effective phishing technique targeting Gmail and other services that

Published on: January 19th, 2017 Howard Solomon

Stay cyber-safe this holiday season

The holidays are a busy time of year, packed with family gatherings, festive parties and hours spent lining up in crowded stores to buy gifts for loved ones. It’s also a time when

Published on: December 21st, 2016 IT Business Staff

Phishing scam that hooked Clinton’s campaign chief a cautionary tale for businesses

Frequently overlooked in the ongoing hullabaloo over Hillary Clinton campaign chair John Podesta's leaked emails and whether they will have an impact on the U.S. first lady-turned-senator-turned-secretary-of-state-turned-presidential candidate's chances of being elected is

Published on: October 31st, 2016 Eric Emin Wood

Dell adds compliance, encryption to hosted email security solution

Dell has announced enhancements to its Hosted Email Security service to allow businesses to continue to rely on this essential communications channel while ensuring confidential business information is secure from outside threats. The

Published on: May 20th, 2015 Jeff Jedras

Only three per cent of people aced Intel’s phishing quiz

We probably think we’re pretty savvy when it comes to identifying online attacks and phishing emails, Intel Security put us to the test and found us lacking: 97 per cent of respondents were

Published on: May 15th, 2015 Jeff Jedras

How hackers can get inside your head

You’re just sitting at your desk, minding your own business, trying to get some work done. You’re not a powerful executive or someone with access to the corporate jewels. Still, cybercriminals are targeting you.

Published on: February 24th, 2015 Jeff Jedras

Will fake profiles be the death of LinkedIn?

Why do they do it? Who is behind these fake profiles on LinkedIn? I've seen a lot more of them recently. Many of you might not have even noticed. Why do I say

Published on: January 9th, 2015 Jim Love

Network intrusions: A 2015 prediction from Howard Solomon, former editor at ITWorldCanada.com

https://www.youtube.com/watch?v=ALIvWJbsnE4 In the year 2015, the ability of IT to detect network intrusions won't improve. There will be more stunning attacks, so your job in the short run is defense. Train staff on

Published on: December 15th, 2014 ITBusiness Staff

Spammers sending more texts ahead of CASL, researchers find

If you’re a resident of Montreal, Que., chances are you’re one of the most targeted people to receive text messaged spam on your phone – and you may have gotten more than usual

Published on: June 20th, 2014 Candice So

FIFA World Cup is hackers’ chance to score personal data

It’s a ritual once every four years – fans gathering in soccer jerseys emblazoned with their favourite players’ names across the back, storming pubs and bars all over Canada to cheer on their

Published on: June 4th, 2014 Candice So

E-commerce and point-of-sales among biggest targets for data breaches

Sensitive, confidential data was hackers’ top target in 2013, alongside credit card and debit card credentials – and two of the worst hot spots were in e-commerce and point-of-sales (POS) terminals, according to

Published on: May 21st, 2014 Candice So