Cyber Security and Privacy

Over the past week, while the concerns have been mounting over cyber attacks initiated from Russia against Ukraine, government, business and investors across the world are shifting to the larger focus of cyber security and information privacy. If evidences of the cyber security as a solid concern were to be requested from real world, the …

SharkBot: A Banking Trojan Spreading via Fake Android Anti-Virus Applications

A deadly banking virus was just identified, spreading through an apparently innocent-looking Android app, and if you are not aware of it, you are most likely a prospective victim of losing your own money. By posing as an antivirus software, the threat actor behind a fledgling Android banking malware known as SharkBot was able to …

This $12 toy can open a garage door in seconds

What is this: Samy Kamkar – a security researcher has developed a method that enables him to open almost any garage door that uses an insecure “fixed code” system in seconds. The device he built called OpenSesame, using a new attack he’s discovered, to reduce the time needed to guess the code to open the …

Samsung just had a data breach of 190GB

On Monday, it was confirmed by Samsung that they had a data breach that exposed internal company data relating to the company’s line of Smartphones, Galaxy. The incident was first reported at the end of last week, when data extortion group Lapsus$ leaked nearly 190GBs of data that they claimed were stolen from Samsung Electronics. …

Alexa vs. Alexa: New Vulnerability With the Amazon Echo?

Alexa might not need your voice command to play Despacito anymore! A new vulnerability, that can be exploited in the Amazon Echo has been found by researchers at the University of London and University of Milan (this will also be referred to as Esposito et al. in the future). The Amazon Echo, similar to the …

A Silent Malware: The Daxin

Every day that we are alive on this planet, humanity and the software continues to grow and evolve collectively, if not together. And everyday we are introduced to more and more vulnerabilities in both areas, from the unfortunate effects of Covid-19 to losing your computer data because all you wanted to see were some dancing …

Google’s latest Radar technology can read body language

Many aspects of our lives have been engulfed by technology, but we do not seamlessly interact with our devices. Google’s Advanced Technology and Products division (ATAP) has revealed its latest research on Soli radar to push the boundaries of non-verbal human-computer interaction1. The technology is capable of reading people’s body language and performing automated tasks.  What …

How to protect your privacy

Instruction Nowadays we can search or browse any information we want through the internet. Creating an account and logging in may help the computer to recommend the related message in a more efficient way. However, the log of data may leak your privacy and that’s the reason why I would like to share this blog. …

Side Channel Attacks could prove disastrous for some corporations.

What is homomorphic encryption? Encryption is useful for communication when 3rd parties are present. A key pair(or sometimes one key) is used to encrypt and decrypt messages/information so that these malicious 3rd parties cannot read the information, or get any hints about what the information can contain. We still see developments in this field, from …

Electric Vehicles: Charging into the Future

Background Have you seen an Electric Vehicle (EV) on the road yet? Maybe you’ve been cut off by a fully electric Tesla on Deerfoot. Or you may have saved a few dollars by taking an “Eco-Friendly Uber Green,” which was most likely a Hybrid Electric Vehicle (HEV). Electric Vehicles are run on electric motors instead …