The Crypto Crash: Is It Really The Future?

The price of Bitcoin plunged to its lowest point in two years. Coinbase, one of the largest cryptocurrency exchanges, lost value on the stock market. Even stablecoins — cryptocurrencies that claim to be backed by the USD, and therefore perpetually worth $1 have crashed. But what does this mean for privacy and cybersecurity? Since cryptocurrency …

Project Post: Using Popular Media as a Tool for Information Security Education

For my final CPSC 602 project, I wanted to create an “unessay” in the form of an educational video that would actually be (hopefully) entertaining to watch. While brainstorming, I thought of all the times I was watching TV and wanted to correct what was happening if it fell within my usual area of expertise. …

Project post: The effect of human error on cyber security

Human error causes problem. Cybersecurity refers to all the technologies, processes and attitudes that aim to protect data, devices, programs, systems and networks from cyber threats and attacks. [1] Experts take all possible measures and precautions to minimize the risk of cybercrime affecting system security. However, we found that the fact is, most threats to organizational information systems …

Adaptive Authentication: Benefits and Opportunities in Security

Security has become a crucial part of the digital era and organizations are moving towards advanced techniques to keep their networks secure from malicious threats. With new advancements in security technology, there is always a level of uncertainty about its efficacy and whether there exist loopholes in its design for exploitation. Authentication mechanisms using single …

Graph Theory in Computational Security

The study of graphs consisting of nodes connected by edges representing some pairwise relation are of interest to security experts who wish to model complex computer or server networks. My paper describes several applications of graph theoretic results in cybersecurity, one of which is introduced here.  The healthcare industry is a frequent target of cyberattacks …

Paper Blog Post: Cybersecurity enforcement on an international level

My final project focused on the international enforcement of laws against cybercrimes. Specifically, it looked to the successes and failures of existing regimes which deal with cybercrime, and then attempted to posit suggestions for both the existing cybercrime framework, and potential new treaty documents. Overview of Cybercrimes A number of difficulties inherent to cybercrimes become …

BNnetXtreme: An enhanced methodology for Bangla fake news detection online

Introduction Reading news online has become more common in Bangladesh, displacing the traditional technique of staying up to date with current events by reading printed copies of newspapers sent to one’s doorstep every morning. As a result of this fact, the number of online news portals has significantly increased as they adapt to the modern …

Paper Blog: The CSE Act and Canadian Cyber Security Practices

In 2019, the Communications Security Establishment (CSE) had its mandates expanded under the CSE Act from three to five, with the two newest additions authorizing the agency to conduct “active” (offensive) and “defensive” cyber operations. My paper asked the following question: What significance does the CSE Act’s new mandates entail for the CSE’s role in …

Mars Stealer Malware using Google Ads to Spread

Mars Stealer is a piece of off-the-shelf malware going for around 160$ for a lifetime subscription on various underground forums and dark web sites. It can steal information from your browser like cookies, autofill data, and credit card info. It can steal information about your computer or even attack your cryptocurrency wallets. Furthermore, depending on …

“Smart” Vehicles Lack of Security

Finding vulnerabilities within automakers are not uncommon and don’t strike as serious, however, issues arise regarding the lack of attention in the cyber security of a vehicle. Major security flaws have been found in “smart” vehicles regarding the Combined Charging system and the keyless entry system of cars. The flaw being, the extreme lack of …