Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.

Imagine a sunny day setting in a coffee shop, peacefully sipping your Frappuccino drink, then someone next to you hijacks your car key fob without even touching it or talking to you. A recent statistic by the Insurance Bureau of Canada (IBC) shows that auto theft insurance claims spiked to $1.5 billion in 2023 [3]. …

The Ethereum Mailing List Breach: A Wake-Up Call for Crypto Security

In July 2024, a massive incident occurred related to Ethereum’s official mailing list. The community faced a security challenge when a phishing email was sent to its subscribers which involved leaking sensitive information about the users. The attackers targeted the mailing list as it is the Key communication path for the Ethereum community. They decided …

Park’N Fly Data Breach 

Introduction  Park’N Fly is a popular airport parking service that experienced a data breach between July 11 to July 13, 2024. This company operates in several cities in Canada such as Ottawa, Montreal, Halifax, Edmonton, Toronto, Winnipeg, and Vancouver. The level of compromise was announced much later in August 2024, disclosing that about 1 million …

Post Quantum Cryptography: Kyber for Dummies

On August 13th 2024 NIST published the standards FIPS 203 (Kyber), FIPS 204 (Dilithium) and FIPS 205 (SPHINCS+) which are all quantum resistant algorithms that will soon replace those currently in use. The Kyber standard is a key encapsulation scheme which uses public key enabling and will replace the Diffie Hellman exchange. Dilithium and SPHINCS+ …

A Passwordless AND Keyless Future

What is Privileged Access Management (PAM)? Privileged Access Management (PAM) is a package of cybersecurity strategies and access management tools utilized for controlling, monitoring, and safeguarding users with privileged access permissions.[3] A PAM system ensures your computers have a secured network that is able to decrease operational complexity and protects important resources such as data, …

Redefining Data Privacy Through Apple Intelligence

In the latest iteration of Apple’s iOS and macOS software update, Sequoia introduced the company’s very own generative AI, Apple Intelligence. With this new venture into AI, Apple hopes to provide generative AI services while maintaining a strong commitment to privacy and security (Newman, 2024). At the core of this innovation is Private Cloud Compute …

An Attack on Two-Factor Authentication

Passwords have become ubiquitous in our lives as the main tool of account authentication, but relying solely on passwords is not very secure. With so many websites we use daily requiring accounts and passwords, many individuals reuse passwords or use very weak ones, like password123 [1]. If a password is reused on multiple sites, and …

Securing Canadian Research: Defending Innovation Against Cyber Threats

In today’s rapidly evolving digital landscape, there has been increase in cyber-attacks, targeting Canadian research, and intellectual property, resulting in stolen work and unauthorized patent filings. Sensitive technology research areas are targeted, with the stolen information being used in ways that threatened Canada’s national security [9]. Cyberattacks on Canadian Research As a leader in advanced …

Ransomware as a Service, Kryptina resurfaces in recent enterprise attacks by Mallox

  Kryptina, once an overlooked free to use Ransomeware as a service available in dark web has resurfaced in recent enterprise attacks. [4]Its return has been marked by an advanced and potent version as per research presented by SentilLabs in LABScon 2024 reported by infosec-magazine.  Mallox Linux 1.0 Mallox Ransomware Group also known as , a …

Software has holes, and hackers will exploit the new vulnerabilities that appear daily.

Introduction Access to information seeking processing software programs that provide functionality to allow you to be connected, productive, creative, and entertained are typically installed on devices. When an attacker discovers a vulnerability, the next step is to exploit it. This allows hackers to use these weaknesses for malevolent purposes. Vulnerability in most software is a …