Tuesday, September 28, 2021
Home 2019 April

Monthly Archives: April 2019

Today's podcast looks at a vulnerability found in millions of Internet connected devices like security cameras, my take on a cyber conference for manufacturers and learn to spot fake social media pages
Threat actors see third parties as easy ways to get into other targets. Experts give advice on what to do
Given that it’s still in the early stages of deployment, carrier plans for 5G networks are still very uncertain. ITWC spoke with Lawrence Surtees, IDC's VP of communication research, to understand what barriers operators are currently facing. On the consumer...
**Warning, this article contains spoilers for Avengers: Endgame** At some point in the future, someone with bad intentions is going to figure out how to use technology to transport back in time and steal all of your secrets. Well, that's almost...
The Canadian channel is a funny thing. On one hand, we have a slew of solution providers and channel leaders suggesting the future of selling technology is here. Long gone are the days of pushing boxes, they say, and...
Official from the Canadian Cyber Security Centre urges manufacturers to work closer on cyber issues. But others say the industry is reluctant. Read why
Today's podcast looks at the amount of personal data that can be found on used hard drives for sale that aren't completely wiped, and why firms need to think about the threat from quantum computers
Microsoft hit $1 trillion in valuation; Canada highlights Facebook’s weak privacy policies; Facebook prepares to be fined by the FTC. It’s all the tech news that’s popular right now. Welcome to Hashtag Trending. It’s Friday, April 26th, and I’m your...
Facebook committed serious violations of Canadian privacy laws and failed to take responsibility for protecting the personal information of Canadians, an investigation conducted by the Office of the Privacy Commissioner of Canada (OPC) has determined. In a press release issued...
Firms should be scared about the potential of quantum computing to break the encryption protecting data, says expert. Read why and what to do