Jan
17
0 comments
Featured Stories
The endpoint protection platform provides a collection of security capabilities to protect PCs, smartphones and tablets. Vendors in this market compete on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Read More
Tags :

Dec
31
0 comments
Featured Stories
A study found that 61.5% of traffic on 20,000 different sites was non-human. Human traffic made up only 38.5% of traffic. Called bots, the non-human web visitors are up a whopping 21 percent 2012.
Read More
Tags :

Dec
29
0 comments
Featured Stories
2014 Predictions Report Examines Key Trends in the Evolution of Ransomware, Advanced Evasion Techniques, and Social Attacks Targeting Personal and Enterprise Users
Read More
Tags :

Dec
29
0 comments
Featured Stories
Target will be the target of consumer skepticism in 2014, and will likely lose ground to competitors like Wal-Mart and Costco as a result of the recent securities breach.
Read More
Tags :

Dec
12
0 comments
Featured Stories
Four people have been arrested and £80,000 in cash seized following the suspected theft of £1m from two banks.
Read More
Tags :

Dec
10
0 comments
Featured Stories
Choose a simpler password for WiFi when family is in town - Set parental controls on gadgets before giving to kids - Be wary of scam emails about package deliveries and charities
Read More
Tags :

Jun
12
0 comments
Featured Stories
Here are some numbers to ponder: • 100,000 new malicious software threats are created each day • 24 million+ malicious URLs detected per month • 4 million browser-based attacks every day • 1.5 billion web-based attacks since 2012 • 1 in every 14 downloads may contain malware • USA is the #1 place for malware attacks
Read More
Tags :

Mar
07
0 comments
Featured Stories
Death, Taxes And PC Security It’s that dreaded time of year again: tax time. The old adage, “nothing can be said to be certain, except death and taxes” is being challenged recently by an additional probability: personal data theft. We protect our homes and vehicles against theft, so how come we’re so naïve about protecting our personal income data, passwords and e-identities, especially around tax time?
Read More
Tags :

Feb
19
0 comments
Featured Stories
Is mobile security something that you should be concerned with? During the Black Hat conference in Las Vegas in 2012, experts illustrated emerging security threats against many technologies used in mobile devices like near field communication (NFC) used for financial transactions, baseband firmware and HTML 5, and many other growing schemes.
Read More
Tags :

Feb
05
0 comments
Featured Stories
While computer security experts and companies have been busy providing measures to keep our laptops and desktop PCs secure, the bad guys have been busy creating new ways to threaten the security of emerging mobile devices.
Read More
Tags :

Jan
22
0 comments
Featured Stories
In the worlds of business and the natural sciences, there is only one true mantra: adapt or perish. It’s no wonder that antivirus makers have had to learn this hard lesson as well. It’s not that they’re not trying or are incompetent; it’s just that the bad guys have adapted faster and more readily to adapting. According to Nicole Perlroth of The New York Times, “the virus creators move too quickly” and are forcing the good guys “to get creative about new approaches to computer security.”
Read More
Tags :

Jan
07
0 comments
Featured Stories
Happy New Year! It’s another New Year and another chance to start afresh, or that’s at least what we say to ourselves each New Year’s Day. With this new beginning, comes a list of new resolutions. When it comes to protecting your computer from security threats, here’s a list of helpful ideas you might want to resolve to use this year.
Read More
Tags :

Dec
28
0 comments
Featured Stories
A Fool And His Money Which three countries are at the top of the list when it comes to money scams? If you guessed the United States, United Kingdom and Nigeria, then you would be right on the money.
Read More
Tags :

Dec
10
0 comments
Featured Stories
Security Essentials “It’s all good, I'm covered.” I wish I could have a dollar for every time someone says that when talking about computer security issues. When it comes to antivirus protection, most home users and many small to medium sized businesses, for that matter, rely on free software from reputable manufacturers. Unfortunately, some of the free stuff out there doesn't quite cut the mustard.
Read More
Tags :

Nov
12
0 comments
Featured Stories
What do 1.7 million Canadians have in common?

What do 1 in 5 university-graduate employees share today?

According to Statistics Canada and a 2008 survey, they work remotely from home. From 2000 to 2008, the number of Canadian workers working from a non-traditional office setting jumped dramatically. Some observers believe this trend was caused by various factors like advancements in IT and the Internet, and the business sector’s shift to out-sourcing work and down sizing the workforce.

Read More
Tags :

Oct
29
0 comments
Featured Stories
Stranger Danger Did you know that more young children today can play a computer game than swim or ride a bike? According to a study commissioned by AVG, 58% play computer games, 20% know how to swim and 52% can ride a bike. Perhaps the most shocking stat is that 69% of kids aged 2-5 are on computers and probably know just enough to get into trouble online.
Read More
Tags :

Oct
11
0 comments
Featured Stories
What do $15 billion dollars, a pipeline and China have in common?

How about foreign espionage and risks to national security? If you’ve been following the news in Canada lately, you may be aware that Chinese entities have been playing more significant roles in the Canadian resource economy. The proposed Chinese takeover of Calgary-based Nexen is a recent example.

Read More
Tags :

Sep
24
0 comments
Featured Stories
High Cost of Free If you’re like me, you’re always on the hunt for a good deal. It’s even better if it’s free, right? When is free not as great a deal as you might think it is? According to Microsoft’s digital crime division, free can cost you your identity, your banking information and even let criminals into your home.
Read More
Tags :

Sep
10
0 comments
Featured Stories
17.7 million. This is the amount of virus definitions files that some major anti-virus manufacturer’s claim are circulating the net.

800 million. This is the amount of active Facebook users.

Combine the two and it’s no wonder that social networking sites, like Facebook, are a prime target for security threats.

Read More
Tags :

Aug
30
0 comments
Featured Stories
New Threats: Keylogging

When it comes to securing your PC against malevolent attacks, most users rely on standard methods of protection like using a firewall and employing anti-virus, anti-spyware and anti-malware software. Most PCs today come with these tools right out of the box.

What’s the threat? There is an emerging threat called keylogging or keystroke logging. Although there are numerous forms of this kind of attack, the outcome is the same, i.e. the keystrokes you make on your computer are covertly sent back to a recipient who intends to use the data for illegal purposes.
Read More
Tags :