Don’t fall for this old scam

By Paul Wood Fake antivirus has been around for a while and it’s a booming business/cybercrime enterprise that probably isn’t going anywhere soon. It is also one of the most popular types of

Published on: September 19th, 2012 Paul Wood

Phishing is not an Olympic sport

By Paul Wood, Cyber Security Intelligence Manager, Symantec The Olympics are an exciting time when our national pride is at an all time high. I’m sure that most of us find ourselves constantly

Published on: August 9th, 2012 Paul Wood

Dropbox launches security probe into spam attacks

Dropbox is investigating reports that some European users are receiving spam to email addresses associated with their accounts, the company said Tuesday.Dropbox, whose cloud storageservice is widely used, said in astatement that "we

Published on: July 18th, 2012 Jeremy Kirk

Android malware increases 1200% in first quarter: McAfee

Levels of computer malware continue to soar sky high with more than 8 million samples detected in the first quarter of 2012, according to a McAfee Inc. report.Significant jumps at the beginning of

Published on: May 23rd, 2012 Brian Jackson

Canada’s anti-spam law takes effect next year

The country's long awaited anti-spam law will be implemented in 2013, according to Industry Minister Christian Paradis. Speaking at the Canada 3.0 Digital Media Forum in Stratford, Ont., this week, the minister said

Published on: April 26th, 2012 Nestor Arellano

How not to spam Twitter

Twitter served notice to spammers earlier this month that it's beefing up its anti-spam measures, and it has filed a lawsuit against five "aggressive tool providers and spammers" to keep its feeds clean.

Published on: April 13th, 2012 Angela West

Do Not Call List should be put on ice

By Brian Jackson The federal government continued limping along in its support of the Do Not Call List with the budget. The stop-gap funding was tagged on as an afterthought to support what

Published on: April 9th, 2012 Brian Jackson

Canada’s Do Not Call List on life support

The national program to block unwanted telemarketing calls and faxes is being thrown a lifeline by the federal government.Canada's Do Not Call List (DNCL) program which is run by the Canadian Radio-television and

Published on: April 5th, 2012 ITBusiness Staff

Canada’s anti-spam regulations finally unveiled

Canadian e-mail marketers now have the final regulations that will be enforced under Canada's Anti-Spam Legislation (CASL) that was passed into law more than a year ago.The regulations don't just impact e-mail. All

Published on: March 28th, 2012 ITBusiness Staff

Botnets – The hacker’s backdoor to your network

  by Paul Comessotti and Kellman Meghu Botnets are one of the most significant network security threats facing organizations today. Compromising anywhere from a few thousand to well over a million systems, botnets

Published on: March 14th, 2012 IDG News Service

Rogue online pharmacies mainly supported by two main domain name registrars

Research done by LegitScript, a company that maintains a database with legitimate online pharmacies, suggests that two domain name registrars are responsible for more than half of all rogue pharmacy sites in the

Published on: March 12th, 2012 Loek Essers

A new take on an old scam

Example of a BBB spoofed email by Paul Wood Social engineering reared its ugly head in January. The latest intelligence report from Symantec saw businesses being targeted with emails purporting to be from

Published on: March 7th, 2012 Paul Wood

How to avoid falling for Valentine cyber scams

Cyber scammers are out to tug on your heart and purse strings this Valentine’s Day with their usual spam and online fraud arsenal but you can avoid being heartbroken by following these tips

Published on: February 10th, 2012 ITBusiness Staff

Better Business Bureau spam contains malware

Spammers are using the name of the Better Business Bureau to propagate malware, according to security company Sophos LtdSophos discovered that emails labeled as coming from the BBB and purporting to contain information

Published on: February 9th, 2012 ITBusiness Staff