78180592

When meeting the IT security standard isn’t enough

There's a price to be paid for organizations that aren't on the leading edge of security -- they usually get...

September 1st, 2014 Howard Solomon

Shutterstock.com

Warning issued for watering-hole attack

Crackers use a number of techniques to get into corporate systems, including reconnaissance through s0-called watering-hole attacks. This appears to...

September 1st, 2014 Howard Solomon

iphone-abstract-flower-iphone-group

Suspicion over celebrity photo hacks pointed at Apple’s iCloud

It was a long weekend for more than 100 international celebrities, and not because of Labour Day. On Sunday someone...

September 1st, 2014 Howard Solomon

Video interview: Check Point Software’s Amnon Bar-Lev

Video interview: Check Point Software’s Amnon Bar-Lev

Let’s face it: 2014 has been a miserable year for IT security professionals. Every week, it seems, an organization somewhere...

August 26th, 2014 Howard Solomon

Image courtesy of Shutterstock.com

How to protect Secure Shell access

A considerable number of Canadian IT departments rely on the Secure Shell protocol for automating access management thanks to it...

August 25th, 2014 Howard Solomon

Image from Shutterstock.com

Another warning about Android apps

A security vendor has raked the Google Play store and the Android ecosystem over the coals for allowing apps that...

August 21st, 2014 Howard Solomon

FEATURE spam-mails-from-tablet-man

Spammers discover iMessage

One of the business users' favorite smart phones is becoming jammed with messaging spam. According to an article on Wired.com, the...

August 21st, 2014 Howard Solomon

Image from Shutterstock.com

Heartbleed exposed cache problem: Researchers

Most IT security pros think of the Heartbleed bug as a software vulnerability in some versions of the OpenSSL software...

August 17th, 2014 Howard Solomon

Image from Shutterstock.com

Six tips to end SQL Injection attacks

These tips are just the tip of the iceberg for what you need to do to stop SQL Injection attacks....

August 12th, 2014 Howard Solomon