Canadian enterprise among victims of macro-based malware attack

A major Canadian corporation is among those in the hospitality industry in several countries whose financial activities have been compromised...

January 19th, 2017 Howard Solomon

Top IT security leaders (and one IoT hacker) reflect on this year’s biggest threats – and what to do next

Security isn’t getting any easier. In the past year, there were more reports than ever before of businesses that were...

Sponsored By: Softchoice

Cyber security

The Ultimate Security Guide: Advice from top leaders in IT security

Security isn’t getting any easier. In the past year, there were more reports than ever before of businesses that were...

Sponsored By: Softchoice

Ransomware: A Victim’s Perspective

Ransomware: A Victim’s Perspective

A vulnerability, large or small, in your organization’s network can lead to a ransomware attack and your valuable data being...

December 10th, 2016 IT World Canada Team

Weekly Update – Amazon AI, Android malware in Google accounts, Canadian immigration

IT World Canada's Eric Emin Wood and Alex Radu discuss the top stories of the week in tech news. Amazon...

December 2nd, 2016 Alex Radu

Bank vault

TrickBot banking Trojan adds Canada to its target list: IBM

Three Canadian banks have been added to the target list of the TrickBot trojan's redirection targets, according to IBM's X-Force...

November 24th, 2016 Howard Solomon

Advanced Malware Protection: A Buyer’s Guide

Advanced Malware Protection: A Buyer’s Guide

Malware can no longer be detected with the traditional methods, which means organizations must adopt an effective defense strategy that...

November 6th, 2016 IT World Canada Team

Visibility and Control to Prevent, Detect, and Remediate Advanced Malware Everywhere

Visibility and Control to Prevent, Detect, and Remediate Advanced Malware Everywhere

Malware acts fast, and your sensitive data and critical systems are on the line. Organizations need to go beyond what...

November 2nd, 2016 IT World Canada Team

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

Beyond the Sandbox: Strengthen Your Edge-to-Endpoint Security

Organizations’ malware analysis needs have gone beyond the traditional sandboxing technologies. It’s time for a more robust malware analysis tool...

November 2nd, 2016 IT World Canada Team