Dado Ruvic / Reuters
He's been held without bail for months.
Up until a few weeks before the hack, Equifax was a partner in the CAA's identity protection program.
It is important to ensure you are doing everything in your power to protect your organization from the potential damage.
Accounts “were temporarily deactivated as part of preventative measures.”
courtneyk via Getty Images
Ransomware is effective because it often arrives via an infected email attachment, like a Microsoft Word or Excel document, appearing to be from someone you know. Once you open the attachment on a vulnerable computer, it starts to run and can lock the files on your computer and network server without your knowledge.
Christian Hartmann / Reuters
If you're in sales at a small business, reaching out to potential customers can be a formidable necessity. Most salespeople are motivated to find new customers, but the way they reach out can be cooki...
Jasmina007 via Getty Images
Macron's campaign says it has been the victim of a 'massive and co-ordinated' hack.
CC0 Public Domain
Just as computer hackers modify programs to access otherwise inaccessible information, travel hackers alter their travel methods to bypass some of the less desirable costs and stresses associated with globetrotting.
Data loss is a fact of life today for organizations. Data loss is caused for a range of reasons including human error, natural disaster, equipment failure and a cyber attacks to name a few. For solution providers, several 2017 trends show that backup and recovery options will be top of mind for small, medium and larger businesses.
Dimitri Otis via Getty Images
Image of "Vladimir Putin carrying his buddy Donald Trump" by DonkeyHotey on flickr through Creative Commons It has yet to be proven. What is known, however, is that the U.S. intelligence community ha...
Colin Anderson via Getty Images
Log management systems are largely based on one concern; finding the root cause of a problem, like security breaching, diagnosing issues, chasing down server errors and looking up customer activity. There is now a market for the logging management industry, whereas there's nothing new about all softwares and systems producing log files.
Deux via Getty Images
Concerns are warranted as drones continue to grow in popularity. Individuals and organizations are being vigilant in their need to detect, protect and respond quickly to security and privacy issues.
Canada is lagging behind the U.S., Britain and other countries in defending citizens and businesses against malicious hackers and cyber-criminals, advocacy groups say.
If you were to get hacked, would it be worse for the hack to affect your Apple account or your Google account? That depends on a lot of factors. But Vladimir Katalov, CEO of Elcomsoft Ltd., a company...
Aku Siukosaari via Getty Images
TORONTO - A hacking problem that affected the Ontario government's websites have been resolved and the province says full service is being restored.A government statement says the websites were not di...
What are best practices individuals can employ to lessen the chance of hacking of their computer or device? Here is a quick "top 20 list," based on part of an education session I have been providing to directors of company boards on cyber security.
In the area of technology, are boards fulfilling their duty of care in overseeing management and protecting shareholders' investment? Indicators are that many boards and directors may not be. Plaintiffs' lawyers are suing companies and their boards over technology failure. Here are some recent statistics and trends.
A Chinese businessman charged with hacking computer systems of U.S. companies with defence contracts remains in custody in Canada. Suspect Su Bin allegedly targeted information on U.S. fighter jet pro...
There are worse things he could be addicted to. It could have been drugs, sex, porn, or the Candy Crush Saga. With my husband, who is a straight up sort of guy, it was computer science.
It seems impossible to think that the answer is HealthCare.gov is just too secure for hackers to break in. After all, no one can write "500 million lines" of code (assuming that figure is correct) without making a few mistakes. There's just no way that software vulnerabilities, which hackers can use to break in, aren't part of the mix.
TORONTO - Gaps in the cyber security efforts of Canadian corporations could be leaving them open to sophisticated attacks by hackers, records show."The current situation is that there are an increasin...
As a marketing professional, there is nothing I hate more than receiving any form of communication (email, Web experience, social media, mobile, whatever) and not see an obvious place where I can either opt out of the communication or protect how much information is being captured. As a consumer, I probably hate it more.
Anonymous sub-group Anti-Sec supposedly holds in its hands 12-million Apple user IDs it acquired from hacking. The hacktivist group refuses to release the IDs until -- wait for it -- Adrien Chen of Gawker poses on the front page of the site in a ballet tutu with a shoe on top of his head. It remains to be seen whether Anonymous does have anything to give the public it strives to supposedly protect, or whether this was just another one of their pranks done "for the lulz," that is to say, for the stroking of their own vanity.
Whether con games are played in the digital world or the physical one, getting someone to lower their guard with a clever ruse makes the life of a thief that much easier. In the vernacular of hackers, this is called social engineering. Social engineering is about hacking the human mind, something that in many ways is significantly easier than finding a new software vulnerability and using it as a gateway into your enterprise.
One way to get hold of that information is to target people according to their jobs and interests, and there is perhaps no greater source of data on those subjects than social networks.
Flickr: Don Hankins
The number of Canadian servers being targeted by hackers has increased sharply, according to an IT security company that compares cybercrime rates around the world. San Diego-based Websense Inc. argu...
A leading cyber-crime expert says foreign hackers who launched a massive attack on Canadian government computers last fall also broke into the data systems of prominent Bay Street law firms and other...
No one is claiming immediate responsibility for Wednesday’s hacking of the BART Police Officers Association’s website and publicizing personal information of union members who patrol the San Francisco...
LONDON - The group known as Anonymous said Saturday it has hacked into some 70 mostly rural law enforcement websites in the United States, a data breach that one local police chief said had leaked inf...
TORONTO - A Canadian-based organization thought to be at the centre of a five-year-long, worldwide cyber attack is questioning claims that its systems were compromised and left open to exploitation fo...
TORONTO - Computer security company McAfee has issued a report detailing a five-year hacking scheme that targeted countries, companies and numerous organizations. McAfee says there were more than 70 i...
CBC -- A Twitter account that claimed to have hacked the Conservative Party website this week claimed Wednesday it also hacked a party database, and posted names and emails online it said were from th...