Post Quantum Cryptography: Kyber for Dummies

On August 13th 2024 NIST published the standards FIPS 203 (Kyber), FIPS 204 (Dilithium) and FIPS 205 (SPHINCS+) which are all quantum resistant algorithms that will soon replace those currently in use. The Kyber standard is a key encapsulation scheme which uses public key enabling and will replace the Diffie Hellman exchange. Dilithium and SPHINCS+ …

A Passwordless AND Keyless Future

What is Privileged Access Management (PAM)? Privileged Access Management (PAM) is a package of cybersecurity strategies and access management tools utilized for controlling, monitoring, and safeguarding users with privileged access permissions.[3] A PAM system ensures your computers have a secured network that is able to decrease operational complexity and protects important resources such as data, …

Redefining Data Privacy Through Apple Intelligence

In the latest iteration of Apple’s iOS and macOS software update, Sequoia introduced the company’s very own generative AI, Apple Intelligence. With this new venture into AI, Apple hopes to provide generative AI services while maintaining a strong commitment to privacy and security (Newman, 2024). At the core of this innovation is Private Cloud Compute …

An Attack on Two-Factor Authentication

Passwords have become ubiquitous in our lives as the main tool of account authentication, but relying solely on passwords is not very secure. With so many websites we use daily requiring accounts and passwords, many individuals reuse passwords or use very weak ones, like password123 [1]. If a password is reused on multiple sites, and …

Securing Canadian Research: Defending Innovation Against Cyber Threats

In today’s rapidly evolving digital landscape, there has been increase in cyber-attacks, targeting Canadian research, and intellectual property, resulting in stolen work and unauthorized patent filings. Sensitive technology research areas are targeted, with the stolen information being used in ways that threatened Canada’s national security [9]. Cyberattacks on Canadian Research As a leader in advanced …

Software has holes, and hackers will exploit the new vulnerabilities that appear daily.

Introduction Access to information seeking processing software programs that provide functionality to allow you to be connected, productive, creative, and entertained are typically installed on devices. When an attacker discovers a vulnerability, the next step is to exploit it. This allows hackers to use these weaknesses for malevolent purposes. Vulnerability in most software is a …

Ransomware Attack on Indonesia’s National Data Center

In June 2024, a ransomware attack broke into the National Data Centre in Indonesia and interrupted major services across the nation. The attackers who appear to be part of a ransomware attack group ‘LockBit’ demanded a ransom of US$ 8 million [1]. The Brain Cypher ransomware was shrouded in several forms and deployed in the …

WazirX Breach

Introduction In the evolving landscape of cryptocurrency, security breaches are a constant threat that can have significant consequences for users and exchanges alike. One of the most alarming incidents 2024 involved WazirX, a prominent cryptocurrency exchange based in India. This breach sent shockwaves through the global crypto community, not only due to the scale of …

International sporting events as targets for various cyber-attacks: The Canadian Cyber Center Warns

In our digital age, cybersecurity is more crucial than ever. Protecting our data privacy and safety is a top priority as we share, shop, work and socialize online. In light of this, the Canadian Center for Cybersecurity recently published an alert outlining several cyber threats connected to significant international sports events.[1] It further warned organizations, …

Are Passwords becoming ancient? A deep dive into FIDO2 and its role in Passwordless Authentication

WHAT IS WRONG WITH PASSWORDS? For years, Regular password systems have provided a more than reliable way for people to protect their information, log into accounts securely and validate their identities. However, in more recent times, it has become substantially easier for ‘hackers’ and cybercriminals to break into supposedly secure password systems and access personal …