

Cyberattackers targeting Canadian businesses (through phishing email scams and social engineering)
A group of cyberattackers that has been targeting Canadian businesses in financially-motivated hacks since at least 2013 has been identified in a new report. Cybersecurity firm FireEye has dubbed the group of attackers as “FIN10” in a report titled “FIN10 Anatomy of a Cyber Extortion Operation” released on Friday morning. FIN10 operates in North America with a predominant focus on Canadian organizations, particularly casinos and mining companies. FireEye believes the group is


The Coolest Cybersecurity Software You've Ever Seen
This Startup Recruited a Hollywood Designer to Create the Coolest Cybersecurity Software You've Ever Seen. Thanks to virtual reality, Denver-based ProtectWise is changing what security looks like. Cybersecurity is perhaps more important than ever, yet its aesthetic hasn't changed much over the past two decades. That inspired Scott Chasin, the former CTO of security software firm McAfee, to start a new company. "Most cybersecurity systems have the same interface as the cable m


The Watchers - Assaults on privacy in America
DO PEOPLE BEHAVE DIFFERENTLY when they think they are being watched? Illustration by Davide Bonazzi When former National Security Agency contractor Edward Snowden revealed the mass surveillance of American citizens in June 2013, the question suddenly grew in importance. Can the behavior of an entire population, even in a modern democracy, be changed by awareness of surveillance? And what are the effects of other kinds of privacy invasions? Jon Penney was nearing the end of a


Another large-scale cyberattack underway: experts
Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week's assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday. The new attack targets the same vulnerabilities the WannaCry ransomware worm exploited but, rather than freeze files, uses the hundreds of thousands of computers believed to have been infected to mine virtual currency. Following the detection of the WannaCry attack on Friday, "researchers at Proofpoint


Cryptographers Demonstrate Collision in Popular SHA-1 Algorithm
On February 23rd, a joint team from the CWI Amsterdam and Google announced that they had generated the first ever collision in the SHA-1 cryptographic hashing algorithm. SHA-1 has long been considered theoretically insecure by cryptanalysts due to weaknesses in the algorithm design, but this marks the first time researchers were actually able to demonstrate a real-world example of the insecurity. In addition to being a powerful Proof of Concept (POC), the computing power th


Surveillance: Your Cubicle Has Ears—and Eyes, and a Brain
Sensors and AI can keep tabs on employees better than any boss. Employers have long wanted to know how their workers spend their time. New office surveillance technology is now making the task far easier. Bloomberg reports that an increasing number of companies are outfitting offices with sensors to keep track of employees. These sensors are hidden in lights, on walls, under desks—anywhere that allows them to measure things like where people are and how much they are talking


CIA Plus Meetup tackles IoT privacy and security
IOT (Internet of Things), and privacy and security implications.