Building a spy phone is as easy as injecting malware into Android apps

Kevin McNamee stands in front of his laptop on a low stage, a phone in his hand as he scrolls through a program showing his phone’s screen, magnified on a projector screen beside

Published on: October 10th, 2013 Candice So

How much fun could an IT security conference be, anyway?

In many ways, attending Toronto's biggest hacker conference is like drinking from a fire hose. At any point in time you have 6 seminars of which at least half are of particular interest.

Published on: October 10th, 2013 Claudiu Popa

Three thoughts for IT security professionals, from SecTor’s G. Mark Hardy

For IT professionals, the security landscape is constantly changing, with new threats regularly cropping up and new ways of combating cybercrime trying to keep up. Yesterday, cyber security expert G. Mark Hardy delivered

Published on: October 9th, 2013 Candice So

Canadians have ‘naive belief’ hackers won’t target them: Trustwave

Small businesses worried about their IT need to find better ways to guard their data – especially as they present easy, unsecured targets, with hackers levelling their sights at them. Contrary to what

Published on: October 8th, 2013 Candice So

Google Wallet and NFC security: guarding against ‘sharks with lasers’

The emergence of mobile payments may offer another convenient way to pay, but does it also open up a door for hackers to pick your pocket? This month, the first field trial of

Published on: September 29th, 2011 Brian Jackson

6 weird malware tricks hackers use to bypass security

The mobile malware deluge everybody has been warning about may not be upon us – yet. But a couple of security experts say this should not lull businesses into a false sense of

Published on: September 26th, 2011 Nestor Arellano

Four security start-ups, four paths to success

What sort of business might an entrepreneur launch in a post-recession economy where funding is scarce, company purse strings tight, and competition abounds?If a room full of IT security professionals at Toronto's Sector

Published on: November 4th, 2010 Brian Jackson

Web threatdown: four new exploits you need to defend against

They say it takes one to know one – so Samy Kamkar is perfectly positioned to identify cutting edge hacking techniques threatening business computers. Samy Kamkar is a hacker, a malware author, an

Published on: November 1st, 2010 Brian Jackson

Video Rewind: How to pick locks and escape handcuffs

Toronto's Sector conference just wrapped up another year, and computer security entrepreneurs and experts are going home with lots to think about.Physical security is just one of those many topics. Just because these

Published on: October 28th, 2010 ITBusiness Staff

Security efforts diminishing privacy, says Ontario expert

People are increasingly -- and willingly -- throwing their privacy to the wind, thanks to an addiction to Google apps, GPS devices, the BlackBerry, iPhone and Android, and social networking sites like Facebook

Published on: October 27th, 2010 Bill Brenner

Canadian IT security survey uncovers paradoxes, ironies

Reports of IT threats continue to grow but Canadian firms keep slashing security budgets, according to a study. Insider breaches are on the upsurge yet local organizations are concentrating their efforts on fighting

Published on: October 9th, 2009 Nestor Arellano

How security pros can do their job well and still be liked

As part of Microsoft's X-box Live team, Stephen "Stepto" Toulouse was proud of the first application he helped develop – a system for accepting user complaints.But he was dismayed to come in to

Published on: October 9th, 2008 Brian Jackson