93998195

Spy malware has been delivered through Office macros for a decade: Report

Security teams are being warned of a just-discovered family of malicious Microsoft Office macros which may have been quietly in...

May 4th, 2016 Howard Solomon

fico

FICO fights cyber crime with iboss using fraud detection IP

A technology that has its roots in missile interception -- and now being used to fight financial fraud -- is...

May 4th, 2016 Gary Hilson

fin6

Cybercriminals are a motivated, patient lot: how the end-to-end data theft cycle keeps on rolling

While the media is resplendent with articles covering security breaches due to hacks, malware and ransomware, rarely does it cover...

April 27th, 2016 Gary Hilson

Cyber-crime-keyboard-620x250

Cybercrime is evolving to be more personal and surreptitious

Organizations need to think hard about why they might be a target of a data breach -- as well as think...

March 1st, 2016 Gary Hilson

Lancope StealthWatch and the Cisco Secure Data Center

Lancope StealthWatch and the Cisco Secure Data Center

Data center operators are challenged with continually adjusting traffic-flow volumes and infrastructure to meet the needs and expectations of the...

February 22nd, 2016 IT World Canada Team

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

To have any chance of effectively defending against modern-day attacks, the solution must use continuous analysis and big data analytics...

February 22nd, 2016 IT World Canada Team

security and privacy issues

Exploit kits will get even more complex, warns Dell

In the fall of last year Dell's security team revealed an exploit kit it dubbed Spartan with a twist: It hid...

February 22nd, 2016 Howard Solomon

Canada_Anti-Spam_2

Canadian banks top targets of malware, says report from Trend Micro

The Toronto-Dominion Bank was the most targeted Canadian brand by malware last year, according to a Trend Micro analysis of...

January 7th, 2016 Howard Solomon

Peer-to-Peer Peril: How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking

Peer-to-Peer Peril: How Peer-to-Peer File Sharing Impacts Vendor Risk and Security Benchmarking

BitSight recently observed the networks of 30,700 companies and found 23 per cent of organizations were using the BitTorrent protocol...

January 3rd, 2016 IT World Canada Team