Email
Password
Remember meForgot password?
    Log in with Twitter

Cybersecurity News

Q&A: Remaining cyber safe when travelling over the Holiday season Special

Douglas Crawford, privacy expert at BestVPN.com, discusses what the Marriott cyber-hack means for the 367 million affected, and how consumers can take better steps in protecting themselves online.

Q&A: Why are we still at risk from email hacking? Special

No one is free from hacking, including world governments. In the technological age we live in how can this still happen? Furthermore, what measures are needed to protect businesses, governments and individuals. A leading expert weighs in.

Australia passes cyber snooping laws with global implications

Sydney - Australia Thursday passed controversial laws allowing spies and police to snoop on the encrypted communications of suspected terrorists and criminals, as experts warned the "unprecedented powers" had far-reaching implications for global cybersecurity.

Marriott data breach reminds travelers to be on guard Special

With Marriott International admitting that hackers stole about 500 million records from its Starwood Hotels reservation system, travelers need to be on their guard, according to Scott Grissom, Chief Product Officer, LegalShield.

Fix Facebook, whether it wants to or not: whistleblower

Apo - Eight months after revealing the links between Facebook and Cambridge Analytica (CA), whistleblower Christopher Wylie is pushing for the internet giant to be regulated -- whether it wants to or not.

Why time matters when dealing with cyber threats

IT professionals are engaged in a continuous arms race with threat actors. In relation to vulnerabilities, this arms race is between attackers' access to exploits and defenders' ability to assess, remediate and mitigate them.

BlackBerry bounces back as a cybersecurity consultancy

BlackBerry may still be associated with the first wave of smartphones, However the Canadian company has had more success recently with system security services and products.

Op-Ed: What exactly is the smart city?

The term 'smart city' is a buzz term used widely in the news, and one that’s increasingly moving from tech pages to news pages. But what is the smart city? Will it change your life? And what are the risks?

London's new digital accelerator hub

London - Keen to establish London as a global digital tech center, a new accelerator has been set up with backing from the U.K. government. Nine firms specializing in cybersecurity are the first cohorts.

Q&A: Cybersecurity solutions for data migration Special

As companies are undergoing digital transformation, many are inadvertently leaving themselves open to cyberattacks, according to Eitan Bremler, Co-Founder and VP of Product at Safe-T.

Making Canadian neighborhoods connected and safe

Toronto - OneEleven and Aviva Canada are coming together to host the event 'Safer Neighbourhoods Hackathon'. The aim is to help to ensure Canadian neighbourhoods are safer and better connected through technology.

Can smart cities become 'cybersecure' cities?

Toronto - Google’s Toronto smart city is an innovative project but it also brings with it various challenges, both technological and in terms of privacy and security. Trend Micro have looked at how smart cities can become cyber-secure cities.

Risk vulnerabilities with telepresence robots

Research from Zingbox has highlighted vulnerabilities with telepresence robots. These weaknesses can be leveraged by hackers to access sensitive data such as chat conversations, images and live video streams.

Q&A: Time to reform Canada's data privacy laws? Special

Do Canadians have “the right to be forgotten?” Canada’s privacy watchdog plans to ask the Federal Court for clarity and at the same time this is being challenged by Google. Expert Éloise Gratton weighs in.

Huazhu Hotels investigating potential loss of guest data

A leading Chinese hotel group - Huazhu Hotels - is investigating a serious leak of millions of guests' data. This follows millions of its customers' records appearing for sale on the Internet.

Q&A: Why cybersecurity needs to be part of digital transformation Special

To advance with digital transformation, a robust approach cybersecurity is needed. This goes hand-in-hand with company strategy as more firms go down the DX path. Jumio Head of Global Marketing Dean Nicolls provides some insights.

Security vulnerabilities at AT&T, T-Mobile and Sprint

Security analysts have detected security flaws with systems at AT&T, Sprint, and T-Mobile. These security issues could have resulted in customer data being accessible to hackers. The issue at each telecommunications company was unrelated.

Improved security for cloud-based machine learning

Boston - Through a new approach involving the combination of two encryption techniques, researchers have strengthened the security that protects private data, while also enabling neural networks to run quickly.

Russian hackers went after conservative US groups: Microsoft

Washington - Russian government hackers tried to hijack the websites of conservative US think tanks, Microsoft said Tuesday, raising fresh alarms over widening efforts by Moscow to sow discord in US politics.

Russian hackers went after conservative US groups: Microsoft

Washington - The Russian hacking unit that tried to interfere in the US presidential election has been targeting conservative US think tanks, Microsoft said.

Microsoft's new cybersecurity framework

Microsoft's has developed a new framework could help policymakers better understand cybersecurity. The set of tools and associated research paper draw upon many years of expertise collected by the technology giant.

Top ten cybersecurity startup vendors revealed

The biggest cybersecurity investment rounds have been reviewed for 2018 so far, and the top ten leading startups have been identified in this expanding technology sector.

New security flaw with Intel processors

Saarburg - A new security flaw has been detected by German researchers in relation to Intel. This comes on the back of earlier concerns from January and March 2018. The flaw means that passwords can potentially be stolen.

Cisco set to acquire 2FA provider Duo Security

Networking hardware company Cisco announced its plans to buy two factor authorization provider Duo Security for a combination of cash and equity awards.

Q&A: Insights into recent global malware attacks Special

Stealing data, credentials, payment information, etc. is a recurring theme in the realm of cybercrime, and much of it is the result of malware. As globalware attacks surpass 9 billion, cyber threats are dominating many business priorities.

Amazon and Wikipedia still giving poor password advice

Plymouth - A decade of research shows that little improvement has been made in the guidance given by leading websites in relation to security and for the protection of privacy data.

Q&A: Cybersecurity risks associated with the smart home Special

Cybersecurity expert Alex Vaystikh recently bought a new dishwasher before realizing that it connects to his Wi-fi to download updates. In an exclusive interview with Digital Journal, Vaystikh expands on smart home risks.

What is the average cost of a data breach?

IBM Security and Ponemon Institute released their study on the average cost of a data breach. In it they found that data breaches are only going up in cost, and in the volume of records stolen.

AI has the potential to reduce cyberattacks: Interview Special

As data becomes more pervasive and more accessible, cybersecurity and privacy concerns continue to be on the rise as well. Can AI can continue to advance without risking highly personal and valuable information? Dan Baird of Wrench.AI shares his views.

AT&T to acquire threat intelligence company AlienVault

Yesterday telecommunications giant AT&T made a move to bolster security for businesses by announcing its intention to acquire California-based cyberthreat response company Alien Vault.
  1 2 3 4 5 6 ... 12 Next»

Set up a news alert for

Cybersecurity


Cybersecurity Image

Malicious subtitle files could compromise computers  security researchers warned today
Malicious subtitle files could compromise computers, security researchers warned today
Check Point Security
Samy Kamkar s $5 Raspberry Pi Zero-based  PoisonTap  hacking tool
Samy Kamkar's $5 Raspberry Pi Zero-based "PoisonTap" hacking tool
Samy Kamkar
No More Ransom helps people recover from ransomware attacks
No More Ransom helps people recover from ransomware attacks
No More Ransom
Gregg Garrett is the Head of International Cybersecurity with BDO USA  LLP  one of the nation’s le...
Gregg Garrett is the Head of International Cybersecurity with BDO USA, LLP, one of the nation’s leading professional services organizations.
BDO USA
Untitled
Loic Venance, AFP
Untitled
By Dwight Burdette (Own work) [CC-BY-3.0 (http://creativecommons.org/licenses/by/3.0)], via Wikimedi
This strong password was created by typing several random letters  numbers and symbols on the keyboa...
This strong password was created by typing several random letters, numbers and symbols on the keyboard
cups.cs.cmu.edu
Windows Defender Dofil cybersecurity response
Windows Defender Dofil cybersecurity response
Microsoft
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple and Cisco have partnered with Allianz to offer discounted cyber insurance
Apple
Five models and three different generations of security token devices for online banking. The newer ...
Five models and three different generations of security token devices for online banking. The newer models are in the foreground.
M0tty
NATO has two rapid reaction teams on standby  armed with fast computers with vulnerability-analysis ...
NATO has two rapid reaction teams on standby, armed with fast computers with vulnerability-analysis code, forensic software and special database management tools 
DAMIEN MEYER, AFP/File
Unsecured Tesla Kubernetes console
Unsecured Tesla Kubernetes console
RedLock
The tool s response to using  testpassword  as a password
The tool's response to using "testpassword" as a password
MIT President  Dr. L Rafael Reif (on left) and IBM Senior Vice President  Cognitive Solutions and Re...
MIT President, Dr. L Rafael Reif (on left) and IBM Senior Vice President, Cognitive Solutions and Research, Dr. John Kelly III (on right), reach a 10-year, $240 million agreement to establish the MIT and IBM Watson AI Lab where fundamental joint research in AI hardware and software will be conducted to propel scientific breakthroughs that will unlock the potential of AI.
MIT and IBM Watson AI Research Lab
A hacker in action.
A hacker in action.
Davide Restivo (CC BY-SA 2.0)
Moscow-based internet security giant Kaspersky has estimated that there are over 1 000 hackers in Ru...
Moscow-based internet security giant Kaspersky has estimated that there are over 1,000 hackers in Russia specialising in financial crime
Kirill Kudryavtsev, AFP/File
IBM Security instructors at the company’s security business headquarters  simulate cyber attacks i...
IBM Security instructors at the company’s security business headquarters, simulate cyber attacks in the world’s first commercial cyber range at the IBM X-Force Command Center in Cambridge, Mass.
MIT and IBM Watson AI Research Lab
Tom Scott speaks at the UK s Parliament and Internet Conference 2012
Tom Scott speaks at the UK's Parliament and Internet Conference 2012
PICTFOR
Critics say the GDPR could take away an important tool used by law enforcement  security researchers...
Critics say the GDPR could take away an important tool used by law enforcement, security researchers, journalists and others.
Thomas Samson, AFP/File
Ryan Stolte  Co-founder and CTO of Bay Dynamics.
Ryan Stolte, Co-founder and CTO of Bay Dynamics.
Bay Dynamics