Recent Features

Look beyond BYOD

Whether officially permitted or not, employees are using personally-owned smart phones, tablets, and PCs for work. A study by Gartner last year found that 57% ...

Rapid Cybersecurity Risk Assessments

Businesses and governments alike are struggling to effectively protect information systems from cyber-attack. The theory appears sound: We conduct risks assessment, identify areas of risk ...

Apple releases iOS 7.1 to address multiple security issues

On Monday Apple released iOS 7.1 to address a number of security issues. The update is now available through iTunes and Software Update on iOS devices. ...

C-13: Who’s the bully?

Bill C-13 is being promoted by the Conservatives as addressing cyber-bulling, but it is much more about the Harper government bullying Canadians into giving up ...

Adobe Releases Security Update for Adobe Shockwave Player

Adobe has released a security update to address a vulnerability in Adobe Shockwave Player 12.0.7.148 and earlier versions for Windows and Macintosh operating systems.

All featured articles »

Latest Cybersecurity News

How a cyber cob patrols the underworld of e-commerce

Melissa Andrews, a resident of Canada, is a cyber security “cop” for Payza, an international e-commerce payment platform operating in 97 countries. Her job, described ...

Google tweaks its terms of service for clarity on Gmail scanning

The company is currently dealing with a lawsuit that challenges its email scanning practices.

Mounties get their man: Canadian Heartbleed hacker nabbed

19 year-old accused of orchestrating attack on tax service: Authorities in Canada have announced the arrest of the man they believe to be behind an ...

Competition challenges students to think like IT professionals

An upcoming college competition will test students’ abilities to defend a simulated small company’s servers against possible security threats and attacks while keeping the servers ...

Microsoft releases new-and-improved Threat Modeling Tool 2014

Threat modeling can help identify “design-level security and privacy weaknesses in systems,” wroteTrustworthy Computing’s Tim Raines. “Threat modeling is also used to help identify mitigations ...

Study: Eighteen percent of online adults have had personal info stolen

About 18 percent of online adults have had personal information stolen, and more than 20 percent had an email or social networking account compromised.

WhatsApp bug allows for interception of shared locations

Researchers identified a vulnerability in WhatsApp that could enable an attacker to intercept shared locations using a man-in-the-middle attack, or a rogue access point.

Report: SQL injection a pervasive threat, behavioral analysis needed

Long lag times between detection and resolution and reliance on traditional methods impair an organization’s ability to combat SQL injection attacks.

Two more states eye drone use limits

Louisiana and Pennsylvania could become the latest states to impose restrictions on the use of commercial drone aircraft over their airspace.

Burnt out on patches this month? Oracle’s got 104 MORE fixes for you

Mass patch for issues across its software catalog: Oracle has released a hefty load of security updates that address a total of 104 different vulnerabilities ...

Oracle fixes 104 flaws in quarterly update, addresses Heartbleed bug

Oracle’s Critical Patch Update (CPU) plugged 37 holes in the popular Java browser plug-in.

Most Heartbleed detection tools have bugs of their own, firm finds

London-based CNS Hut3 warns that flaws in many Heartbleed detection tools could give companies a “false sense of security.”

More Cybersecurity News