Eric's latest column

Political will and the confidence of citizens

Free and fair elections are the cornerstone of a democratic society. Those truly interested in ensuring fair elections need to focus on the bigger picture.

Recent

RCMP’s new media saavy

The RCMP adopted a new media strategy earlier this month by inviting two journalists, Dave Seglins of the CBC and Robert Cribb of the Toronto ...

Dark Internet Mail Environment

In the wake of unprecedented hacks and global surveillance revelations, it has never been more clear that the global email system does not come even close to meeting modern privacy and confidentiality requirements. Ladar Levison is on a mission to change that and solve the email privacy problem.

End metadata games

Federal Court Justice Simon Noël’s ruling that CSIS has been illegally storing metadata for more than a decade demonstrates the need for clear rules and strong oversight of Canadian intelligence and law enforcement agencies.

Stop phishing: Take the bait out of email

Individuals, corporations, and governments continue to succumb to phishing attacks. Large ISPs have become better at detecting and stopping simplistic high-volume phishing campaigns, and security ...

IoT devices used in devastating DDoS attacks

Recent Distributed Denial of Service (DDoS) attacks on journalist Brian Krebs and Internet giant Dyn serve as a dire warning: Fatally flawed IoT devices are enabling devastating cyber attacks.

The magnitude of the cybercrime problem

Public Safety Canada’s consultation on cyber security closed this past weekend, and on October 19 the Senate Liberals are holding an Open Caucus on “The State of Cyber Security in Canada.” Hopefully, these, and similar initiatives will lead to significant changes in addressing cybercrime in Canada.





Virtru Debuts Security Encryption Key Server for Cloud Email

Customer Key Server (CKS) gives enterprises control over their cloud email encryption keys. You can read the full article here.

The NSA and Skilz: Turning spying on you into a video game

What could possibly be creepier than a government organization (such as the NSA) having nearly unlimited access to your private, personal information (including access to ...

Researchers find a way to bypass the iOS activation lock

Two researchers claim to have found a way to bypass the activation lock feature in iOS that’s supposed to prevent anyone from using an iPhone ...

Solution to JIT-ROP cyber attacks: Scramble code quickly

A new software development technique promises to end destructive exploits from hackers. The concept is to continually, and repeatedly, rearrange the program’s code while it’s ...

Researchers find a way bypass the iOS activation lock

Two researchers claim to have found a way to bypass the activation lock feature in iOS that’s supposed to prevent anyone from using an iPhone ...

Visa Delays Chip Deadline for Pumps To 2020

Visa this week delayed by three years a deadline for fuel station owners to install payment terminals at the pump that are capable of handling ...

More Cybersecurity News

Remote management app exposes millions of Android users to hacking

Poor implementation of encryption in a popular Android remote management application exposes millions of users to data theft and remote code execution attacks. According to ...

Trump Cybersecurity Do’s and Don’ts

President-elect Donald Trump ran a campaign focused on national security and making America great again through economic reform. Clearly both goals should include policies and ...

Dark Web Vendor Gets 50 Months Jail For ID Theft

Minnesota resident Aaron Glende aka IcyEagle caught selling stolen bank details on AlphaBay market. You can read the full article here.

‘Distributed guessing’ attack lets hackers verify Visa card details

Add credit card fraud to the list of things that distributed processing can speed up. An e-commerce site will typically block a credit card number ...

Severe AirDroid vulnerability threatens tens of millions of Android users

Popular remote management utility AirDroid has attracted tens of millions of users with the lure of sharing the messages and files on their phones with ...

Botnet Known as ‘Avalanche’ Taken Down by Law Enforcement

Global effort to stop botnet involved blocking or seizing 800,000 domains. You can read the full article here.

How Windows 10 data collection trades privacy for security

Windows 10’s aggressive data-collection capabilities may concern users about corporate spying, but enterprises have control that consumer-edition Windows users do not: Administrators can decide how ...

The Human Firewall: Why People Are Critical To Email Security

Technology is just the beginning; employees must be fully on board with security procedures. You can read the full article here.

Sh… IoT just got real: Mirai botnet attacks targeting multiple ISPs

Now ZyXEL and D-Link routers from Post Office and TalkTalk under siege Analysis The Mirai botnet has struck again, with hundreds of thousands of TalkTalk ...

It Took 4 Years to Take Down ‘Avalanche,’ a Huge Online Crime Ring

The network, known as “Avalanche,” served as a platform for phishing, malware distribution, and money laundering. The post It Took 4 Years to Take Down ...

Microsoft’s ‘Samaritan’ refuses help to hackers doing Win 10 recon

‘SAMRi10’ script hides the creds hackers crave, making box-to-box jumps harder Microsoft hacker Itai Grady has created a tool to help protect blackhat scouts from ...

Hackers waste Xbox One, PS4, MacBook, Pixel, with USB zapper

What would happen if someone sticks this USBBQ into an airplane seat socket? VIDS Hackers are destroying everything from the latest gaming systems, phones, and ...

Shamoon malware returns to again wipe Saudi-owned computers

Iran suspected as likely source of re-vamped nastyware Thousands of computers in Saudi Arabia’s civil aviation agency and other Gulf State organisations have been wiped ...

Online criminals chilled as cops shutter Avalanche dark network

Four-year op by US and EU culminates in arrests, server seizures On November 30, simultaneous raids in five countries by the FBI, Europol, and the ...

Avalanche Botnet Comes Tumbling Down In Largest-Ever Sinkholing Operation

800,000 domains seized, sinkholed, or blocked, and five individuals arrested, in international effort to bring down botnet linked to 17 major malware families. You can ...

Major cybercrime network Avalanche dismantled in global takedown

Law enforcement agencies have dismantled a major cybercriminal network responsible for malware-based attacks that have been harassing victims across the globe for years. The network, ...

Mandia: Russian State Hackers Changed The Game

Founder of Mandiant and FireEye CEO says Russia doesn’t appear to want to cover its tracks anymore. You can read the full article here.

Best practices for lowering cyber insurance costs and cyber risk

Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network ...

Europol cop took terror dossier home, flashed it to the web accidentally

Europe’s FBI sheds light on security bungle An investigator at Europe’s FBI Europol took home a USB stick packed with terror probe documents and accidentally ...

More Items »