The days of smart living is now! Its not in the past nor in the future, we are living smart! I can conveniently connect with devices with a sound of my voice, a tap of my finger or phone, a wave of my hand and so many interesting and easy ways! Isn’t that smooth?!… sure, …
Category Archives: Uncategorized
Ransomware Attack on University Medical Center (UMC)
Introduction: At present, the healthcare system has become one of the most popular targets for cybercriminals. Cyberattacks on hospitals as well as on medical centers have increased drastically in recent years. On 26 September 2024, the University Medical Centre (UMC) Health System in Lubbock, Texas, was hit by a serious ransomware attack. This attack affected …
Continue reading “Ransomware Attack on University Medical Center (UMC)”
Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.
Imagine a sunny day setting in a coffee shop, peacefully sipping your Frappuccino drink, then someone next to you hijacks your car key fob without even touching it or talking to you. A recent statistic by the Insurance Bureau of Canada (IBC) shows that auto theft insurance claims spiked to $1.5 billion in 2023 [3]. …
Continue reading “Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.”
The Ethereum Mailing List Breach: A Wake-Up Call for Crypto Security
In July 2024, a massive incident occurred related to Ethereum’s official mailing list. The community faced a security challenge when a phishing email was sent to its subscribers which involved leaking sensitive information about the users. The attackers targeted the mailing list as it is the Key communication path for the Ethereum community. They decided …
Continue reading “The Ethereum Mailing List Breach: A Wake-Up Call for Crypto Security”
Park’N Fly Data Breach
Introduction Park’N Fly is a popular airport parking service that experienced a data breach between July 11 to July 13, 2024. This company operates in several cities in Canada such as Ottawa, Montreal, Halifax, Edmonton, Toronto, Winnipeg, and Vancouver. The level of compromise was announced much later in August 2024, disclosing that about 1 million …
Post Quantum Cryptography: Kyber for Dummies
On August 13th 2024 NIST published the standards FIPS 203 (Kyber), FIPS 204 (Dilithium) and FIPS 205 (SPHINCS+) which are all quantum resistant algorithms that will soon replace those currently in use. The Kyber standard is a key encapsulation scheme which uses public key enabling and will replace the Diffie Hellman exchange. Dilithium and SPHINCS+ …
Continue reading “Post Quantum Cryptography: Kyber for Dummies”
A Passwordless AND Keyless Future
What is Privileged Access Management (PAM)? Privileged Access Management (PAM) is a package of cybersecurity strategies and access management tools utilized for controlling, monitoring, and safeguarding users with privileged access permissions.[3] A PAM system ensures your computers have a secured network that is able to decrease operational complexity and protects important resources such as data, …
Redefining Data Privacy Through Apple Intelligence
In the latest iteration of Apple’s iOS and macOS software update, Sequoia introduced the company’s very own generative AI, Apple Intelligence. With this new venture into AI, Apple hopes to provide generative AI services while maintaining a strong commitment to privacy and security (Newman, 2024). At the core of this innovation is Private Cloud Compute …
Continue reading “Redefining Data Privacy Through Apple Intelligence”
An Attack on Two-Factor Authentication
Passwords have become ubiquitous in our lives as the main tool of account authentication, but relying solely on passwords is not very secure. With so many websites we use daily requiring accounts and passwords, many individuals reuse passwords or use very weak ones, like password123 [1]. If a password is reused on multiple sites, and …
Securing Canadian Research: Defending Innovation Against Cyber Threats
In today’s rapidly evolving digital landscape, there has been increase in cyber-attacks, targeting Canadian research, and intellectual property, resulting in stolen work and unauthorized patent filings. Sensitive technology research areas are targeted, with the stolen information being used in ways that threatened Canada’s national security [9]. Cyberattacks on Canadian Research As a leader in advanced …
Continue reading “Securing Canadian Research: Defending Innovation Against Cyber Threats”