Privacy & Security

ESET hunts down the developer and operator of Android adware affecting 8 million users

With over 2.8 million available apps in Google’s Play Store, malicious actors can occasionally slip through Google’s stringent verification system. ESET researchers have detected 42 Android apps in the Google Play store using several tricks to stay hidden. ESET says 21 of them were active at the time of the discovery. This money-making adware campaign […]

ESET hunts down the developer and operator of Android adware affecting 8 million users Read More »

Trend Micro acquires Cloud Conformity

Trend Micro Inc. today expanded its cloud security portfolio through acquiring Cloud Security Posture Management (CSPM) firm Cloud Conformity Pty. Ltd., which was founded in Australia but is headquartered in the United States of America. According to a Gartner report, at least 99 per cent of cloud security failures will be the customer’s fault through

Trend Micro acquires Cloud Conformity Read More »

Cyber Security Today – Canada Post password alert, sextortion, Samsung phone fingerprint trouble and more

Canada Post password alert, sextortion, Samsung phone fingerprint trouble and more. Welcome to Cyber Security Today. It’s Friday October 18th, I’m Howard Solomon, contributing reporter on cyber security for ITWorldCanada.com. Security experts urge people not to use the same password on more than one site. That’s because when hackers steal passwords and usernames from one

Cyber Security Today – Canada Post password alert, sextortion, Samsung phone fingerprint trouble and more Read More »

IBM and McAfee launch Open Cybersecurity Alliance to help vendors interoperate

LAS VEGAS — McAfee and IBM Security have announced that they are the founding members of the Open Cybersecurity Alliance (OCA), a group of 18 companies whose goal is to foster interoperability and easy integration between security vendors. The project is under the auspices of OASIS (Organization for the Advancement of Structured Information Standards), a

IBM and McAfee launch Open Cybersecurity Alliance to help vendors interoperate Read More »

What infosec pros can learn from Tony Stark

Image by Yogysic, Getty Images. Infosec pros usually toil unappreciated in organizations, often fighting sometimes losing battles against well-armed opponents, and sometimes seemingly deaf employees. They ache to be superheros. Well, Aamir Lakhani, a global security strategist at Fortinet, believes fictional superheroes like Iron Man Tony Stark can teach them some lessons. At least that’s

What infosec pros can learn from Tony Stark Read More »

Password lessons: Longer is better, so is salt

Infosec pros who had no idea of how easily a stolen list of hashed passwords could be cracked got a sobering lesson at this month’s SecTor security conference in Toronto. There, Will Hunt, co-founder of the U.K. based In.security consulting firm, casually talked of systems that can be built around a common (about $1,500) Nvidea

Password lessons: Longer is better, so is salt Read More »

Canadian consumers aren’t taking IoT security seriously enough, says ESET report

Despite rampant outbreak of cybersecurity incidents, consumers are still not taking proper steps to safeguard their internet-connected devices, concluded an ESET survey study with 4,000 participants. With a tally of 7 billion and counting, the number of IoT devices is expected to rise to 21 billion by 2025. According to IoT Analytics, the number of

Canadian consumers aren’t taking IoT security seriously enough, says ESET report Read More »

Canadian SMBs incur a potential productivity loss of CA$2 billion using older technology 

A recent study commissioned by Microsoft and Intel reported that the cost of using a PC older than four years is more than buying a new one.  As per StatsCanada, the country is home to around 1.2 million small and medium businesses. These businesses comprise 98.8 per cent of the total employee businesses in the

Canadian SMBs incur a potential productivity loss of CA$2 billion using older technology  Read More »

SecTor 2019: The past, present, and future of malware

The evolution of malware has come a long way. From the Creeper Worm, the first known computer virus, which was designed in 1971 by Robert H. Thomas, to where we are today is night and day. It is a constantly evolving science. Bad actors adapt to the newest security practises; finding new ways to exploit

SecTor 2019: The past, present, and future of malware Read More »

SecTor 2019: How to survive a ransomware attack

Ransomware is not the newest form of cyberattack, although its popularity remains relatively high and the results remain quite devastating, according to cybersecurity experts who spoke at SecTor 2019 this week in Toronto. So, by now, you likely know what ransomware is all about. But just to be sure, let’s run over a quick explanation.

SecTor 2019: How to survive a ransomware attack Read More »

WP Twitter Auto Publish Powered By : XYZScripts.com
Exit mobile version