How to protect your personal info on Facebook

Posted by & filed under Cybersecurity, FaceBook.

Facebook users who are worried about protecting their personal information in the wake of the alleged privacy breach by Cambridge Analytica have a few options at their disposal. The U.K. data firm has denied any wrongdoing and Facebook has said that, while none of the information leaked was the result of a data breach, it… Read more »

They thought they were downloading Skype. Instead they got spyware

Posted by & filed under Cybersecurity.

Since last fall, Turkish internet users attempting to download one of a handful of popular apps may have been the unwitting targets of a wide-reaching computer surveillance campaign. And in Egypt, users across the country have, seemingly at random, had their browsing activity mysteriously redirected to online money-making schemes. Internet filtering equipment sold by technology… Read more »

Federal budget to spend up to $1 billion on cybersecurity

Posted by & filed under Careers, Cybersecurity.

Next week’s federal budget is expected to make a significant investment in building up Canada’s cyber defences and encouraging tech firms and talented programmers to work with the federal government, CBC News has learned. Several government sources say up to $1 billion has been requested by federal departments to address a growing number of cybersecurity… Read more »

IoT is Coming Even if the Security Isn’t Ready: Here’s What to Do

Posted by & filed under Cybersecurity, Internet of Things.

In a May study of 553 IT decision makers, 78% said they thought it was at least somewhat likely that their businesses would suffer data loss or theft enabled by IoT devices. Some 72% said the speed at which IoT is advancing makes it harder to keep up with evolving security requirements. Source: Wired Magazine Date: February 23rd, 2018… Read more »

If Canadian spies found a flaw in the iPhone, would they tell Apple?

Posted by & filed under Apple, Cybersecurity.

It’s unclear what Canada’s electronic spy agency, the Communications Security Establishment, does when it finds a security flaw in a widely used operating system or a much-loved messaging app. Source: CBC News Date: February 8th, 2018 Link: http://www.cbc.ca/news/technology/cse-c59-software-vulnerabilities-disclosure-matthew-dube-1.4508703 Discussion 1) Does the Canadian CSE have a duty to protect Canadian’s from a security flaw or protect Canadian security?… Read more »

ATM “jackpotting” comes to the U.S. as alleged thieves trick machines into giving up $328,200

Posted by & filed under Cybersecurity.

Two Venezuelan men went on a crime spree through Colorado, Idaho and Utah, cracking into seven ATMs and using software to trick the machines into spitting out as much as $98,000 at a time.  The alleged crooks used a technique common in Latin America and Europe but very new in the U.S. called “jackpotting.” Thieves use a key… Read more »

Data-stealing spyware ‘traced to Lebanon’

Posted by & filed under Cybersecurity.

A security bug that has infected thousands of smartphones has been uncovered by campaign group the Electronic Frontier Foundation (EFF).  Working with mobile security firm Lookout, researchers discovered that malware in fake messaging designed to look like WhatsApp and Signal had stolen gigabytes of data.  Targets included military personnel, activists, journalists and lawyers.  Researchers say they traced the… Read more »

Update your software today. Seriously.

Posted by & filed under Cybersecurity.

Chances are you own a smartphone or computer that contains a chip hackers could potentially exploit to get access to sensitive information.  That’s because billions of devices are affected by two major security flaws revealed by cybersecurity researchers recently. The flaws — dubbed Meltdown and Spectre — affect processing chips made by Intel (INTC), AMD(AMD) and ARM Holdings. That means if you… Read more »

The labs that protect against cyber warfare

Posted by & filed under Cybersecurity.

The world has entered a new era of conflict – offensive cyber-attacks aimed at infrastructure and society, all done without a shot being fired. The first nation state-level cyber-attack on critical infrastructure, widely attributed to a joint collaboration between American and Israeli intelligence against Iran, was uncovered in 2010. Known as the Stuxnet virus, the attack aimed… Read more »

HP laptops found to have hidden keylogger

Posted by & filed under Consumer Technology, Cybersecurity, Ethical Issues.

Hidden software that can record every letter typed on a computer keyboard has been discovered pre-installed on hundreds of HP laptop models. Security researcher Michael Myng found the keylogging code in software drivers preinstalled on HP laptops to make the keyboard work. HP said more than 460 models of laptop were affected by the “potential security vulnerability”. Source: BBC Technology… Read more »