Cryptocurrency mining malware wreaks havoc in 2018
Kaspersky Lab has released a new report on the global outbreak in malicious cryptocurrency mining that unfolded in 2018, which saw the number of...
New Cybersecurity Report from Devolutions Reveals Trends, Stats, Recs for SMBs
Montreal-based developer Devolutions released a report titled, “The State of Cybersecurity in SMBs in 2021-2022,” which features stats and trends from Devolutions’ second annual...
Get Ready For Crowdsource Hacking!
Julian discussed with Paul Ciesielski, Chief Revenue Officer at Bugcrowd, a crowdsource security testing company. Paul provided insights into the company's background, services, and...
Personal Information Of Almost 3 Million Desjardins Customers Were Stolen
When Alphonse Desjardins started his business on December 6th, 1900, I am sure he never dreamed that 120 years later the company could lose...
How to Prepare and Protect your Digital Legacy
As we know in today’s world, the Internet and digital applications is woven into every day life.
From our personal lives to our careers, our...
Dave Sobel and Julian Lee Discuss Their Take on Security
No one is surprised to know that 2020 did not go quite as planned. Everything happened in a fast way and accelerated every trend,...
Protect your online security this Black Friday and Cyber Monday
Here are some tips from ESET to Canadians shopping online during the biggest shopping weekends.
As Canadians from coast to coast continue to battle the...
Hunting for the Footprints of Cyber Criminals
With a cybersecurity workforce gap 4 million people wide and economic uncertainty plaguing budgets, cyber teams are short on resources to conduct the proactive...
How Cybercriminals Abuse Airbnb For Fraudulent Activities
Cyberattacks are becoming increasingly common and sophisticated. One particular concern is the rising misuse of popular platforms like Airbnb. The following highlights how cybercriminals...
Scaling MSP Profitability with Keeper’s Privileged Access Platform
Keeper Security is aggressively evolving its channel strategy to transition partners from transactional password management to a high-margin, strategic Privileged Access Management (PAM) model....















