HomeSecurity

Security

NBA

With more organizations facing a barrage of security threats -- worms, viruses , zero-day attacks and even insider abuse -- a new category of security tool is expected to gain traction in the enterprise in 2007: network behavior analysis. NBA tools use traffic-monitoring techniques coupled with security intelligence to spot anomalous actions within the corporate network and mitigate threats quickly

These chips can do everything

Chip makers, including Intel Corp. and Advanced Micro Devices Inc. (AMD), are ushering in a new era in processor design by adding hardware-enabled features to their wares. The goal is to either replace functions that have traditionally been done via software or, more often, significantly improve the operation of the software.

NetMax device uses encrypted VPN to secure WiFi

The device is aimed at solving mounting security concerns around mobile Internet access by securing Wi-Fi Internet use. The DataTurf system uses an encrypted VPN (virtual private network) to secure connections over, say, an unsecured public Wi-Fi hotspot back to a device sitting at the user's home.

Phishing toolkit dupes unsuspecting victims in real time

According to RSA Security's Anti-Fraud Command Center, the phishing toolkit can be easily configured for multiple targets, configured to import pages from any target organization and intercept any credentials even after a victim has logged into an online account.

Featured Security Download

Security Resource Kit

Security Training Resource Kit

Experts say that training can reduce security incidents by anywhere from 45% to 70%. "We asked ourselves why security training couldn't be fun as well as informative." IT World Canada and it's creative arm, Amazing! Agency have created some training materials which actually make security training engaging and interesting. Each unit starts with a fun video or interactive game and let's you get the interest of the group....

Security Videos

Security Blogs

Slideshows

Amazon Canada device lineup 2023: Alexa gets more ChatGPT-like; Echo series expands; FireTVs, Tablets, Ring and more

Generative AI, geeky new Echo features and smarter TVs and tablets headlined at Amazon’s annual fall hardware event. Here’s a list of everything coming...

30 valuable hidden iPhone features [Part 1]

Using these ten hidden iPhone features will make your iPhone experience more productive and valuable.

10 free cybersecurity awareness training courses you can take today

A list of 10 organizations that are offering free cybersecurity awareness training courses to help you understand and report security threats and breaches.

Has your iPhone been hacked?

We've listed 13 ways hackers can compromise iPhones and highlighted ways to protect yourself and your data.