Being the operating system of most smartphones, Android is now the target of malwares. Kaspersky Lab stated that almost all the mobile malware discovered during Q1 of this year are designed to target Android phones. According to Mashable, the most common Trojan virus steals money from unsuspecting victims by sending bogus text messages. Hackers use…

By Louis Tetu, CEO of Coveo In the past several years, as cloud computing has become one of the top IT priorities, we can agree that, for the most part, we’ve overcome the primary concerns associated with the technology – security, reliability and performance. With these concerns at least partly alleviated, it’s important to now…

by Erik Grueter Cloud computing is set for a number of big shakeups this year. The big story is in the effect these changes will have on smaller businesses. Public clouds that can be accessed cheaply and without a big IT overhead are likely to be chosen by small, developer friendly companies. Big data is…

by Erik Grueter What if your software could detect when it was under attack? What if files reported when, where and by whom they were opened? Intelligent digital assets are behind an agile new security style called Information Based Security.  Developed in response to an increased use of file sharing services, personal devices, and niche business applications….

Now that cloud computing technology has already gone past the infancy stages, many industries have already realized the benefits it provides, and have already started adopting and integrating the technology to their businesses. One key sector that stands to benefit a lot from the cloud is marketing, as it has the ability to drastically change…

Cyberwar fundamentally changes how government must handle security. Faced with increasingly sophisticated attacks from gangs of cyber criminals and foreign governments probing systems for sensitive data, threats frequently go undetected for days, weeks, and even months. And it’s not just financial data being stolen. Terrorists and rogue governments may steal confidential data, including intelligence information,…

The US Department of Defense had recently announced that it plans to provide its employees with mobile devices, computer tablets, as well as smartphones for them to be able to share protected and classified data quickly. With the latest mobile technologies, the military will be equipped with the necessary secured devices. Due to this announcement,…

Cloud Security Alliance (CSA), a non-profit industry organization that promotes the protection techniques in the cloud, has recently updated its list of the top threats of cloud in the report entitled “The Notorious Nine Cloud Computing Top Threats in 2013”. CSA indicates that the report reflects the consensus of the experts on the most significant…

Traders and users who want to use cloud, smartphones and tablets as mobile payment devices card processing should be cautious and wait for the availability of greater protection techniques. It is a recommendation of the PCI Security Standards Council, which considers that, in its current stage, these systems introduce new security challenges. The PCI Security…