Jan
17
0 comments
News & Threats
- Researchers created a mathematical model to help hackers time attacks - It focuses on 'zero-day' vulnerabilities that have not yet been exploited - These vulnerabilities are security flaws that developers aren’t yet aware of - Hackers store these flaws to strike when the most damage will be caused - Model assesses the type of flaw and the risks to choose when to strike
Read More
Tags :

Jan
17
0 comments
Featured Stories
The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Read More
Tags :

Jan
03
0 comments
News & Threats
User wonder whether their snaps are safe - potentially exposing personal conversations and causing major embarrassment.
Read More
Tags :

Jan
03
0 comments
News & Threats
Read More
Tags :

Dec
31
0 comments
Featured Stories
A study found that 61.5% of traffic on 20,000 different sites was non-human. Human traffic made up only 38.5% of traffic. Called bots, the non-human web visitors are up a whopping 21 percent 2012.
Read More
Tags :

Dec
29
0 comments
News & Threats
With mobile firmly entrenched in both the personal and work arena, cyber-criminals are stepping up attacks against smartphones and tablets.
Read More
Tags :

Dec
29
0 comments
Featured Stories
2014 Predictions Report Examines Key Trends in the Evolution of Ransomware, Advanced Evasion Techniques, and Social Attacks Targeting Personal and Enterprise Users
Read More
Tags :

Dec
29
0 comments
Featured Stories
Target will be the target of consumer skepticism in 2014, and will likely lose ground to competitors like Wal-Mart and Costco as a result of the recent securities breach.
Read More
Tags :

Dec
29
0 comments
Read More
Tags :

Dec
29
0 comments
Read More
Tags :

Dec
12
0 comments
Featured Stories
Four people have been arrested and £80,000 in cash seized following the suspected theft of £1m from two banks.
Read More
Tags :

Dec
12
0 comments
News & Threats
Fat fingers dump network dumps in 20,000 emails
Read More
Tags :

Dec
10
0 comments
Featured Stories
Choose a simpler password for WiFi when family is in town - Set parental controls on gadgets before giving to kids - Be wary of scam emails about package deliveries and charities
Read More
Tags :

Dec
10
0 comments
News & Threats
Modified malware grabs credit card details at point of sale...
Read More
Tags :

Dec
10
0 comments
News & Threats
Taken from theguardian.com A panel of data and information security experts share what they think will be the big talking points in 2014
Read More
Tags :

Dec
10
0 comments
News & Threats
The risk of infections on Smartphones is growing as OS standardization makes it easier for hackers to write malicious software that can spread an infection easily - yet most smartphones remain unprotected...
Read More
Tags :

Dec
10
0 comments
News & Threats
Are businesses, both large and small, guilty of supporting cyber crime by not taking adequate steps to protect themselves and their clients?
Read More
Tags :

Dec
10
0 comments
News & Threats
Researchers create proof-of-concept software to show how standalone computers can communicate via built-in speakers and microphones.
Read More
Tags :

Jun
12
0 comments
Featured Stories
Here are some numbers to ponder: • 100,000 new malicious software threats are created each day • 24 million+ malicious URLs detected per month • 4 million browser-based attacks every day • 1.5 billion web-based attacks since 2012 • 1 in every 14 downloads may contain malware • USA is the #1 place for malware attacks
Read More
Tags :

Mar
27
0 comments
News & Threats
A record-breaking cyberattack targeting an anti-spam watchdog group has sent ripples of disruption coursing across the Web, experts said Wednesday. Spamhaus, a site responsible for keeping ads for counterfeit Viagra and bogus weight-loss pills out of the world's inboxes, said it had been buffeted by the monster denial-of-service attack since mid-March, apparently from groups angry at being blacklisted by the Swiss-British group. "It is a small miracle that we're still online," Spamhaus researcher Vincent Hanna said.
Read More
Tags :

Mar
07
0 comments
Featured Stories
Death, Taxes And PC Security It’s that dreaded time of year again: tax time. The old adage, “nothing can be said to be certain, except death and taxes” is being challenged recently by an additional probability: personal data theft. We protect our homes and vehicles against theft, so how come we’re so naïve about protecting our personal income data, passwords and e-identities, especially around tax time?
Read More
Tags :

Feb
19
0 comments
News & Threats
BOCA Raton, FL (August 1, 2012) - iS3, a South Florida-based security solution provider offering virus protection for PC's, Android Smartphones and Tablets, Data Recovery and Backup and Virtual Tech Support has announced today that their new STOPzilla AVM received a perfect score of 100 percent on its recent certification testing, on Windows XP, conducted by West Coast Labs, part of the Haymarket Media Group, and one of the world's leading independent test facilities for information security products and services.
Read More
Tags :

Feb
19
0 comments
Featured Stories
Is mobile security something that you should be concerned with? During the Black Hat conference in Las Vegas in 2012, experts illustrated emerging security threats against many technologies used in mobile devices like near field communication (NFC) used for financial transactions, baseband firmware and HTML 5, and many other growing schemes.
Read More
Tags :

Feb
05
0 comments
Featured Stories
While computer security experts and companies have been busy providing measures to keep our laptops and desktop PCs secure, the bad guys have been busy creating new ways to threaten the security of emerging mobile devices.
Read More
Tags :

Jan
22
0 comments
Featured Stories
In the worlds of business and the natural sciences, there is only one true mantra: adapt or perish. It’s no wonder that antivirus makers have had to learn this hard lesson as well. It’s not that they’re not trying or are incompetent; it’s just that the bad guys have adapted faster and more readily to adapting. According to Nicole Perlroth of The New York Times, “the virus creators move too quickly” and are forcing the good guys “to get creative about new approaches to computer security.”
Read More
Tags :

Jan
08
0 comments
News & Threats
Over the course of a year, Austrian testing lab AV-Comparatives puts antivirus and security suiteproducts through a wide-ranging regimen of tests. The product that scores best overall in the year's tests earns the title "Product of the Year." Bitdefender took that honor this year, but the competition was tight. Tests and Scoring Nine significant tests from 2012 fed into the results for this year end summary. Two File Detection tests, roughly six months apart, measured a product's ability to detect current malware. A Proactive detection test evaluated zero-day malware blocking by forcing each product to use outdated malware definitions. Detecting active malware isn't sufficient; security products should also clean up the infestation. AV-Comparatives ran a Malware Removal test that specifically used samples detected by all tested products, checking how thoroughly each cleaned up malware traces.
Read More
Tags :

Jan
07
0 comments
Featured Stories
Happy New Year! It’s another New Year and another chance to start afresh, or that’s at least what we say to ourselves each New Year’s Day. With this new beginning, comes a list of new resolutions. When it comes to protecting your computer from security threats, here’s a list of helpful ideas you might want to resolve to use this year.
Read More
Tags :

Dec
28
0 comments
Featured Stories
A Fool And His Money Which three countries are at the top of the list when it comes to money scams? If you guessed the United States, United Kingdom and Nigeria, then you would be right on the money.
Read More
Tags :

Dec
10
0 comments
Featured Stories
Security Essentials “It’s all good, I'm covered.” I wish I could have a dollar for every time someone says that when talking about computer security issues. When it comes to antivirus protection, most home users and many small to medium sized businesses, for that matter, rely on free software from reputable manufacturers. Unfortunately, some of the free stuff out there doesn't quite cut the mustard.
Read More
Tags :

Nov
12
0 comments
Featured Stories
What do 1.7 million Canadians have in common?

What do 1 in 5 university-graduate employees share today?

According to Statistics Canada and a 2008 survey, they work remotely from home. From 2000 to 2008, the number of Canadian workers working from a non-traditional office setting jumped dramatically. Some observers believe this trend was caused by various factors like advancements in IT and the Internet, and the business sector’s shift to out-sourcing work and down sizing the workforce.

Read More
Tags :

Oct
29
0 comments
Featured Stories
Stranger Danger Did you know that more young children today can play a computer game than swim or ride a bike? According to a study commissioned by AVG, 58% play computer games, 20% know how to swim and 52% can ride a bike. Perhaps the most shocking stat is that 69% of kids aged 2-5 are on computers and probably know just enough to get into trouble online.
Read More
Tags :

Oct
24
0 comments
News & Threats
There is a 'new' fraud trend occurring in Canada that I would like to notify local business owners about. We have already had one business affected by it and anticipate more. Here is a summary of this complex fraud:
Read More
Tags :

Oct
11
0 comments
Featured Stories
What do $15 billion dollars, a pipeline and China have in common?

How about foreign espionage and risks to national security? If you’ve been following the news in Canada lately, you may be aware that Chinese entities have been playing more significant roles in the Canadian resource economy. The proposed Chinese takeover of Calgary-based Nexen is a recent example.

Read More
Tags :

Oct
03
0 comments
News & Threats
A leading international expert on computer hacking says cyber-attacks are increasingly targeting the heart of Canada’s infrastructure, including oil pipelines and major public utilities. CBC News has confirmed a recent cyber-attack successfully breached a Calgary-based supplier of control systems for electrical power grids, municipal water systems, public transit operations, and most of Canada’s major oil and gas pipelines.
Read More
Tags :

Sep
26
0 comments
News & Threats
Business group downplays fears of Chinese security threats Canadian business leaders have heard all the warnings about China: fears that Chinese hackers and cyber-spies may be trying to breach the computer networks of Canadian companies and government departments, and concerns about huge state-owned companies taking over vital Canadian resources.
Read More
Tags :

Sep
24
0 comments
Featured Stories
High Cost of Free If you’re like me, you’re always on the hunt for a good deal. It’s even better if it’s free, right? When is free not as great a deal as you might think it is? According to Microsoft’s digital crime division, free can cost you your identity, your banking information and even let criminals into your home.
Read More
Tags :

Sep
15
0 comments
News & Threats
I feel like a complete idiot. I just got taken by a LinkedIn spam that may have just stolen my banking password.

This is not the first time I've been an idiot or clicked on something I shouldn't. But this one could be really bad for me.

Read More
Tags :

Sep
12
0 comments
News & Threats
Web sites serviced by DNS and hosting provider Go Daddy were down for most of today, but were back up later this afternoon. A hacker using the "Anonymous Own3r" Twitter account claimed credit for the outage.
Read More
Tags :

Sep
10
0 comments
Featured Stories
17.7 million. This is the amount of virus definitions files that some major anti-virus manufacturer’s claim are circulating the net.

800 million. This is the amount of active Facebook users.

Combine the two and it’s no wonder that social networking sites, like Facebook, are a prime target for security threats.

Read More
Tags :

Sep
04
0 comments
News & Threats
The FBI is currently denying that a hacker group, AntiSec, released a file on the internet on Monday that contains over one million UDID Apple codes. Every Apple iPod, iPad and laptop has one of these unique 40-character strings.
Read More
Tags :

Aug
30
0 comments
Featured Stories
New Threats: Keylogging

When it comes to securing your PC against malevolent attacks, most users rely on standard methods of protection like using a firewall and employing anti-virus, anti-spyware and anti-malware software. Most PCs today come with these tools right out of the box.

What’s the threat? There is an emerging threat called keylogging or keystroke logging. Although there are numerous forms of this kind of attack, the outcome is the same, i.e. the keystrokes you make on your computer are covertly sent back to a recipient who intends to use the data for illegal purposes.
Read More
Tags :

Get this feed