HomeSecurity

Security

Retro worm targets Windows

A new variant of the Lovgate worm has been discovered infecting PCs globally, according to security bulletins by major security firms including Symantec Corp. and McAfee Inc.

Software boosts laptop security

Although physically securing laptops has traditionally fallen into the realms of locks and cables, some vendors are now offering software solutions to help track the growing number of stolen mobile computers

Web servers still doling out ‘Scob’ code

More than 100 Web servers are still distributing the "Scob" malicious code, first identified two weeks ago as code used in a widespread attack to plant Trojan horse programs on vulnerable computers, according to one computer security company. That attack used compromised Microsoft Corp. Internet Information Services (IIS) Web servers to distribute the Trojan horse programs.

The convergence (or not) of security and operations event monitoring

Event monitoring is of interest from both a security and an operations perspective, but to date they have tended to be implemented separately with different toolsets. This joint interest has given rise to vendors and enterprises exploring the convergence of these two capabilities. Although overlaps in technologies, requirements, and processes exist, significant differences remain, which will impede full convergence indefinitely.

Featured Security Download

Security Resource Kit

Security Training Resource Kit

Experts say that training can reduce security incidents by anywhere from 45% to 70%. "We asked ourselves why security training couldn't be fun as well as informative." IT World Canada and it's creative arm, Amazing! Agency have created some training materials which actually make security training engaging and interesting. Each unit starts with a fun video or interactive game and let's you get the interest of the group....

Security Videos

Security Blogs

Slideshows

Amazon Canada device lineup 2023: Alexa gets more ChatGPT-like; Echo series expands; FireTVs, Tablets, Ring and more

Generative AI, geeky new Echo features and smarter TVs and tablets headlined at Amazon’s annual fall hardware event. Here’s a list of everything coming...

30 valuable hidden iPhone features [Part 1]

Using these ten hidden iPhone features will make your iPhone experience more productive and valuable.

10 free cybersecurity awareness training courses you can take today

A list of 10 organizations that are offering free cybersecurity awareness training courses to help you understand and report security threats and breaches.

Has your iPhone been hacked?

We've listed 13 ways hackers can compromise iPhones and highlighted ways to protect yourself and your data.