News
This article uncovers prominent Trojan categories and provides deep insights into functions, activities, and communication processes used by famous Trojan families.
U.S. president Joe Biden today issued an Executive Order establishing new standards for the use of artificial intelligence applications in the U.S. federal government, government-funded programs ...
Social media platforms should be forced by the Canadian government to toughen their privacy practices, an expert told a parliamentary committee looking into illicit data harvesting by apps like ...
This second article of the Understanding Cybersecurity on Smartphones (UCS-Sph) series delves into Microsoft's Windows Phone, a mobile OS that has undergone significant changes over the years. The ...
Forty-eight countries, including Canada and the U.S., have agreed their governments shouldn't give in to ransomware demands. The promise came Wednesday at the end of the third annual meeting in ...
We've collected comments from more than 40 vendors to give infosec pros an idea of what they might face in the next 12 months. Their predictions cover everything from meeting the talent shortage ...
Just how real is quantum computing? We have an amazing guest on our Weekend Edition who will talk about how she is helping people prepare for IT careers using quantum computing. Meta’s new AI ...
Cisco has proactively shipped modified switches to Ukrenergo, the state-owned electricity grid operator in Ukraine, to bolster its defenses against Russian cyberattacks targeting energy ...
One of Canada’s biggest car and truck rental agencies is trying to recover after being hit by a ransomware attack. A spokesperson for U.S. based vehicle rental giant Enterprise Holdings ...
What are Canadian companies actually doing in terms of projects with cloud and generative AI? How are they navigating the uncertainty of a relatively new technology? Those were the questions that ...
A new US government report warns that AI presents an “extinction level threat to the human species. Elon Musk is outsourcing his Grok AI code. Hackers have breached the Cybersecurity and ...
Mandiant says the loss of control of its X/Twitter account last week was likely caused by a brute force password attack on one employee's account by a cryptocurrency scammer. Normally, two-factor ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results