YouTube popularity attracting criminals

Enterprises are increasingly using YouTube as their vehicle for hosting internal an external videos. However, researchers at vendor Trend Micro have discovered that criminals are exploiting the popularity of site by finding ways

Published on: October 20th, 2014 Howard Solomon

Hackers using new Windows vulnerability

Microsoft is rushing out a patch for a newly-discovered zero-day vulnerability which affects all currently  supported versions of  Windows (including Vista) and Windows Server 2008 and 2012. The news came this morning from

Published on: October 14th, 2014 Howard Solomon

Things bad in IT security now? It could get worse

Hackers are having a field day, major corporations are reporting huge data breaches almost every day, CSOs are pulling their hair out trying to keep networks secure. What could be worse for IT

Published on: October 8th, 2014 Howard Solomon

Time to get more aggressive on cybersecurity?

The revelation this week that U.S. -based outlets of Home Depot may have suffered a stunning data breach -- one source thinks data was siphoned from every one of its 2,200 stores --

Published on: September 4th, 2014 Howard Solomon

When meeting the IT security standard isn’t enough

There's a price to be paid for organizations that aren't on the leading edge of security -- they usually get caught. That's the lesson from an incident a Canadian penetration tester ran into

Published on: September 1st, 2014 Howard Solomon

Warning issued for watering-hole attack

Crackers use a number of techniques to get into corporate systems, including reconnaissance through s0-called watering-hole attacks. This appears to be behind the discovery by a California unified threat management company called Alien

Published on: September 1st, 2014 Howard Solomon

Suspicion over celebrity photo hacks pointed at Apple’s iCloud

It was a long weekend for more than 100 international celebrities, and not because of Labour Day. On Sunday someone published nude photos of a number of well-known performers including Jennifer Lawrence, Rhianna,

Published on: September 1st, 2014 Howard Solomon

Video interview: Check Point Software’s Amnon Bar-Lev

Let’s face it: 2014 has been a miserable year for IT security professionals. Every week, it seems, an organization somewhere around the world confesses its systems have been broken into and data has

Published on: August 26th, 2014 Howard Solomon

How to protect Secure Shell access

A considerable number of Canadian IT departments rely on the Secure Shell protocol for automating access management thanks to it being embedded in a wide number of IT, networking and security products. Its

Published on: August 25th, 2014 Howard Solomon