Author Archives: [email protected]

Cyber Security Today, Week in Review for week ending Friday, March 1, 2024

Welcome to Cyber Security Today. From Toronto, this is the Week in Review for the week ending Friday March 1st, 2024 I’m Howard Solomon, contributing reporter on cybersecurity for ITWorldCanada.com and TechNewsday.com in the U.S. In a few minutes Terry Cutler of Cyology Labs will join me to discuss some of the news from the […]

Competition Bureau obtains court order to further investigation into Google’s ad practices

The Competition Bureau has announced that it has expanded its investigation into Google’s online ad practices. This is the first major update to the investigation since it began in 2020, and a year later the competition watchdog obtained a court order from the Federal Courts of Appeal, requiring Google to produce records and written information […]

Healthcare sector “stretched thin” in fight against cyber attacks warns CSO of Health-ISAC

Healthcare organizations need more support from boards and governments to defend against the rising number of cyber attacks, particularly ransomware, says the chief security officer of a U.S.-based information sharing and analysis centre for the sector. “Organizations are stretched thin, they just don’t have the people, budget to support the basic types of [cybersecurity] programs,” […]

Why Compliance is a Roadmap to Security

Originally published by RegScale.In the realm of cybersecurity, compliance is often perceived as a necessary but sometimes challenging aspect of safeguarding data and systems. As we celebrate Cybersecurity Awareness Month, let’s delve into the evolving role of compliance in the cybersecurity landscape.Compliance: A Roadmap to SecurityCompliance doesn’t make you secure. Compliance gives you the questions […]

New Phishing Kit Leverages SMS, Voice Calls to Target Cryptocurrency Users

A novel phishing kit has been observed impersonating the login pages of well-known cryptocurrency services as part of an attack cluster designed to primarily target mobile devices. “This kit enables attackers to build carbon copies of single sign-on (SSO) pages, then use a combination of email, SMS, and voice phishing to trick the target into […]

This site uses cookies to offer you a better browsing experience. By browsing this website, you agree to our use of cookies. Click More Info to view Privacy Policy.