University of Toronto - News, Features, and Slideshows
An analysis of a piece of Android spyware targeting a prominent Tibetan political figure suggests it may have been built to figure out the victim's exact location.
By Jeremy Kirk | 02 April, 2013 02:55
Google has acquired a startup from the computer science department of the University of Toronto to get key researchers in the area of deep neural networks.
By John Ribeiro | 13 March, 2013 04:00
Web hosting providers from the U.S., Canada and other Western nations have been hosting official Syrian government websites, in violation of sanction orders from the U.S. and other governments, according to a Canadian Web research organization.
By Grant Gross | 30 November, 2012 19:00
After the hacking gang Anonymous took credit for defacing Syria's Ministry of Defense website, a Syrian group today retaliated by posting gruesome photos on Anonymous' embryonic social network.
By Gregg Keizer | 09 August, 2011 04:47
The following report, is based on a global survey of 706 IT and security professionals conducted in the United States, Canada, Germany, United Kingdom, Australia and New Zealand. The goal of the survey was to capture data on current attitudes and trends with mobile devices and IT security. This is the third survey on this topic and this report evaluates differences in responses to similar questions asked over the past two years.
For the foreseeable future, a two-tier DDoS protection architecture should continue to provide the flexibility and manageability that today’s architects need to combat the modern DDoS threat. This recommended DDoS protection reference architecture leverages F5’s long experience combatting DDoS attacks with its customers. •Learn the four categories of DDoS threats and the recommended mitigation architectures •Answer why you should consider a cloud based scrubbing service and how to choose one •Understand the benefits to a multi-tier DDoS protection architecture
- Cybercriminals borrow from APT playbook in attack against PoS vendors
- New app can unearth video gems on Periscope
- WPI's team gears up for final battle of the bots
- The Upload: Your tech news briefing for Tuesday, May 5
- IN PICTURES: CeBIT 2015, Sydney, Trade Show
- IN PICTURES: CeBIT 2015, Sydney, Day One Keynote addresses
- Kevin Mitnick's tips for countering social engineering
- Vic govt push to streamline service delivery
- Netflix open-sources security incident management tool
- Sally Beauty investigates possible second card breach
- Coles trials voice-recognition gizmo Hiku
- Infrastructure modernisation drives efficiencies at ANZ
- Rombertik malware destroys computers if detected
- Rackspace adds second Australian data centre
- Canva targets SMBs with new subscription product