The assets of iconic publisher IT World Canada are up for sale. Today the Trustee, Crowe Soberman released the notice of sale. The following is a summary of that information taken from the PDF ...
North Korea exploits weak email DMARC settings, and the latest Verizon analysis of thousands of data breaches. Welcome to Cyber Security Today. It’s Friday May 3rd, 2024. I’m Howard Solomon, ...
Data may have been stolen in London Drugs cyber attack, Congressional testimony today by UnitedHealth CEO on ransomware attack, and more. Welcome to Cyber Security Today. It’s Wednesday, May 1st, 2024 ...
Credential stuffing attacks are hitting firms using Okta ID management solutions, and more. Welcome to Cyber Security Today. It’s Monday, April 29, 2024. I’m Howard Solomon. Credential stuffing ...
Police bust phishing rental platform, a nine-year old virus found on Ukrainian computers, and more. Welcome to Cyber Security Today. It’s Friday, April 19th, 2024. I’m Howard Solomon. The Europol ...
Vidyard, a popular video messaging company, has recently announced its entry into the virtual digital avatar market and secured new funding of $15M from Export Development Canada (EDC), BMO Capital ...
Act fast to a plug hole in Palo Alto Networks firewall, Canadian comedy festival loses over $800K in email scam, and more. Welcome to Cyber Security Today. It’s Monday, April 15th, 2024. I’m ...
Early Saturday morning listeners may have missed my weekend interview segment with Senator Colin Deacon. If you did, it was totally my fault. A typo in my posting instructions meant we didn’t get it ...
A new program called CyberTowns is setting out to identify the best communities across Canada to start and grow a career in the cybersecurity and IT fields. Launched by the Canadian Cybersecurity ...
The state of AI is the second in this series prepared for the long weekend. In part one, we traced the evolution of Artificial Intelligence. In episode two, we discuss where we are today in the ...
A new cyberthreat is taking down home routers. Germany passes a law insisting on end to end encryption. Reports expose the craziness of tech hiring practices, the US government has had it with SQL ...
This second article of the Understanding Cybersecurity on Smartphones (UCS-Sph) series delves into Microsoft’s Windows Phone, a mobile OS that has undergone significant changes over the years. The ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results