security and privacy issues

Industrial control system breaches rising, says new report

Breaches that result in the theft of millions of pieces of personal data get big headlines, such as those involving...

June 25th, 2015 Howard Solomon

Feature browser

Service aims to make CSP violation reports easier to get

For a couple of years security pros have browser tools to combat Web page cross-site scripting and related attacks. One...

May 27th, 2015 Howard Solomon

Point of Sale - Credit Card Swipe

New spam campaign includes POS exploit delivered via resumes

A number of retailers have point of sale machines that can also be used for Internet connectivity by staff. The...

May 26th, 2015 Howard Solomon


Free security tools recommended by experts

Network security pros are known for their colourful language, usually because when something hits the fan they get called first....

May 11th, 2015 Howard Solomon

Image from (c) Maksim Kabakou

IT security industry partly to blame for successful attacks, says vendor

An official of an IT security vendor admits the industry still isn't doing a good enough job of meeting the...

April 8th, 2015 Howard Solomon

Image from (c) Maksim Kabakou

Malware campaign attacking select targets, including Canada

A skilled group of attackers believed based in Lebanon has successfully penetrated and stolen data from a large number of individuals...

April 1st, 2015 Howard Solomon


Eight per cent of your partners may be a high security risk: Study

One of the weakest links in an organization's IT security may be the most obvious: The telecom provider. That's one...

March 31st, 2015 Howard Solomon

Image from

Rogers loses some business customer info in breach

A Rogers Communications staffer has apparently become the latest Canadian employee to fall victim to a phishing scam which resulted...

March 3rd, 2015 Howard Solomon

Data breach notification in Canada

IT security weak because enterprises aren’t learning: HP

Philospher Geroge Santaya once said those who cannot remember the past are condemned to repeat it. IT security researchers say...

February 23rd, 2015 Howard Solomon