HomeSecurity

Security

Network security will dominate worries this year

Security concerns will dominate the network landscape in 2008, as they have in most years

Storm worm continues to rage via rootkit

Spam messages attempting to dupe users into installing the bot-making Trojan now include links happycards2008.com or newyearcards2008.com. Prepare your users for the latest attack

Security hall of shame lists winners for 2007

A review of the year's notable security mishaps, breaches and meltdowns feature TJX, TD Ameritrade Holding Corp., and others

Symantec forecasts holiday spike in IM threats

Watch out for so-called free 'licence' agreements that require you to watch a video on a social networking site and a substantial increase in spam, according to the vendor

Featured Security Download

Security Resource Kit

Security Training Resource Kit

Experts say that training can reduce security incidents by anywhere from 45% to 70%. "We asked ourselves why security training couldn't be fun as well as informative." IT World Canada and it's creative arm, Amazing! Agency have created some training materials which actually make security training engaging and interesting. Each unit starts with a fun video or interactive game and let's you get the interest of the group....

Security Videos

Security Blogs

Slideshows

Amazon Canada device lineup 2023: Alexa gets more ChatGPT-like; Echo series expands; FireTVs, Tablets, Ring and more

Generative AI, geeky new Echo features and smarter TVs and tablets headlined at Amazon’s annual fall hardware event. Here’s a list of everything coming...

30 valuable hidden iPhone features [Part 1]

Using these ten hidden iPhone features will make your iPhone experience more productive and valuable.

10 free cybersecurity awareness training courses you can take today

A list of 10 organizations that are offering free cybersecurity awareness training courses to help you understand and report security threats and breaches.

Has your iPhone been hacked?

We've listed 13 ways hackers can compromise iPhones and highlighted ways to protect yourself and your data.