From: CIBC Date: Tue, Feb 11, 2014 at 10:54 PM Subject: Security Notice To: Dear CIBC valued customer, Due to maintainance services on our databases, we require our customers to verify their online accounts by completing an online form. We have upgraded our services to provide a higher layer of security to our clients. To […]

Hello Everyone! Every wondered if you antivirus is working ? Ever wanted to test the real-time protection of your antivirus and its effectiveness of threat detection ? Well there is a free online resource you can use to download different types if files such as .zip files .com or .html file that should set off

IS your Antivirus working ?Read More »

Hello everyone! There is a very cool website http://www.haveibeenpwned.com/ This website tracks websites that have been compromised and the hack has been made public for example the Adobe website hack you can enter your email address into the site this is the email you would have registered with and will cross reference it with the

Has your email been pwned ? check with cool websiteRead More »

Hello everyone!, Recently in the news there has been reports that hackers used a keylogger to capture logins of approximately 2Million user accounts belonging to Twitter/Facebook/Linkedin users of those services are strongly urged to change their passwords to prevent any future login attempts researches from trustwave have stated that the data breach has been going

Facebook/Twitter/Linkedin passwords stolen!Read More »

Hello everyone With the Christmas season in full swing that time of year where hackers and scam artists try to exploit the holiday season with new tricks to steal your identity and try their new scams here are some tips when shopping online When shopping online 1.) Beware of too good to be true offers

Protecting your self online during the holidays !Read More »

Hello All, If you are running a linux based webserver or any type of server as a best practice is to view any unauthorized access attempts against your server this can give you an insight as to if your server is being bruteforce attacked or if someone within your network is attempting to gain access

Auditing for unauthorized access attempts with the auth.log file (LINUX)Read More »