HomeSecurity

Security

Swapping out firewalls easier said than done

Moving from one brand of gateway firewall to another is proving to be a daunting task that corporate customers say takes six or more months because of a lack of industry standards and dearth of migration tools.

W3C: Phishing remains root of flourishing e-crime

Internet crime often starts with phishing, the practice of duping a user into revealing bank account or log-in credentials via a fraudulent Web site. Phishers send out reams of e-mail bait that say users' account information has expired or needs updating. The e-mail includes links to a site that may look very similar to their bank Web site, but isn't. Once those credentials are obtained, criminals use the information in a variety of creative and costly scams

E-mail attacks target unpatched Word hole

Antivirus companies and the SANS Internet Storm Center (ISC) issued a warning Friday about sophisticated e-mail attacks that are using a previously unknown hole in Microsoft Word to infiltrate corporate networks.

India’s IT industry to set up data security watchdog

India's National Association of Software and Services Companies (Nasscom) is setting up a watchdog organization that will focus on the introduction and monitoring of best data security and privacy practices in the country's IT services, call centre and business process outsourcing (BPO) industries.

Featured Security Download

Security Resource Kit

Security Training Resource Kit

Experts say that training can reduce security incidents by anywhere from 45% to 70%. "We asked ourselves why security training couldn't be fun as well as informative." IT World Canada and it's creative arm, Amazing! Agency have created some training materials which actually make security training engaging and interesting. Each unit starts with a fun video or interactive game and let's you get the interest of the group....

Security Videos

Security Blogs

Slideshows

Amazon Canada device lineup 2023: Alexa gets more ChatGPT-like; Echo series expands; FireTVs, Tablets, Ring and more

Generative AI, geeky new Echo features and smarter TVs and tablets headlined at Amazon’s annual fall hardware event. Here’s a list of everything coming...

30 valuable hidden iPhone features [Part 1]

Using these ten hidden iPhone features will make your iPhone experience more productive and valuable.

10 free cybersecurity awareness training courses you can take today

A list of 10 organizations that are offering free cybersecurity awareness training courses to help you understand and report security threats and breaches.

Has your iPhone been hacked?

We've listed 13 ways hackers can compromise iPhones and highlighted ways to protect yourself and your data.