Keep an eye on social media for advanced cyber-attack warnings

More than one IT security expert has warned CISOs need to be proactive to thwart cyber attacks before they get...

November 5th, 2015 Howard Solomon
The Internet

Spam bot leverages Linux-based CMSs, report warns

For some time infosec pros have known that plugins for WordPress, Joomla and other content management systems are being leveraged...

November 2nd, 2015 Howard Solomon

Seven tips for creating a better password policy

In the not too-distance future passwords will disappear, replaced by biometrics, smart phones and other tricks. Until then system administrators...

October 30th, 2015 Howard Solomon

What CISOs should be ready for when they face the board

Boards of directors are increasingly paying more attention to IT security, and for good reason. They may personally be on...

October 27th, 2015 Howard Solomon

Researchers find a way to improve password protection

IBM researchers in Zurich hope they've found a way to solve one of the great vexing problems for CISOs: Making...

October 19th, 2015 Howard Solomon
Voice Neon Lights

When Siri listens to strangers: Novel hack exploits voice command vulnerability

Your smart phone could be triggered remotely to dial a phone number run by cyber thieves to download cash. How?...

October 15th, 2015 Howard Solomon
Bank vault

Almost all stolen data has a price, report warns

Canadians often worry that we suffer by comparison to our neighbors to the south. But in one category we're way...

October 15th, 2015 Howard Solomon
security and privacy issues

Tool for eBay’s Magneto e-commerce platform has vulnerability

E-commerce has been a savior for many organizations -- particularly SMBs -- because it can allow them to pick a...

October 15th, 2015 Howard Solomon
bandaid, fix, repair

Microsoft, Adobe and Google issue flood of fixes

This is a big week for updates: Microsoft issued its usual Windows fixes on Patch Tuesday, but also Adobe pushed...

October 14th, 2015 Howard Solomon