Airport delays, banks not working correctly, hospitals not able to provide services and many other daily services were affected due to the CrowdStrike Falcon EDR issue. But, what was the cause of this? And what can we learn from this incident? Let’s explore the issue report provided from CrowdStrike itself and make an analysis of …
Category Archives: Uncategorized
Schools are facing security breaches in the beginning of new session
The largest district school board in Canada was targeted by the LockBit ransomware gang, and the board acknowledged that an unknown number of students from the 2023–2024 school year had their personal information compromised in June, 2024. Affected student data include names, birthdates, email addresses, grades, school names, and student numbers. LockBit sets a September …
Continue reading “Schools are facing security breaches in the beginning of new session”
Avis Data Breach Exposes Nearly 300,000 Customers.
Avis, a major car rental company, recently experienced a data breach that compromised the personal information of nearly 300,000 customers. The breach occurred between August 3 and August 6, 2024, when an unauthorized third party gained access to one of Avis’ business applications. The company quickly cut off access, initiated an investigation with cybersecurity experts, …
Continue reading “Avis Data Breach Exposes Nearly 300,000 Customers.”
RegreSSHion: Remote Code Execution in OpenSSH
On July 1st, 2024, the security firm Qualys published their discovery of a vulnerability within the OpenSSH daemon that allowed for unauthenticated, network-exploitable, remote code execution [1]. As a ubiquitous means of secure access to remote servers, the vulnerability allowed for attackers to gain unfettered, superuser access to a majority of servers running Linux, which …
Continue reading “RegreSSHion: Remote Code Execution in OpenSSH”
Common Mistakes and Future Trends in Cryptography and Optimizing Homomorphic Encryption.
As cryptography becomes increasingly integral to cybersecurity, both experts and newcomers must avoid common pitfalls and stay informed about emerging trends. Ensuring secure communication, data protection, and trust in online transactions relies on the proper implementation of cryptographic techniques. This post explores common mistakes made in cryptography and highlights current and future trends shaping its …
Pavel Durov’s Arrest: A Wake-Up Call for Digital Privacy and Free Speech
Pavel Durov is definitely one of the more intriguing figures in the tech world. With a net worth of $15.5 billion1 and no traditional assets to speak of, he’s already an enigma. He’s even claimed to have fathered over 100 kids!2 People compare him to Mark Zuckerberg3 and Elon Musk4, and he’s earned the nickname …
Continue reading “Pavel Durov’s Arrest: A Wake-Up Call for Digital Privacy and Free Speech”
Park’N Fly Data Breach Affects 1 Million Customers: What You Need to Know
Canadian off-airport parking service provider Park’N Fly is notifying 1 million customers of a security incident involving their personally identifiable information. On August 23, 2024, Park’N Fly reported a significant data breach that compromised approximately 1 million customer records. The affected customers were notified via email about the breach. Park’N Fly, which offers 24/7 parking …
Continue reading “Park’N Fly Data Breach Affects 1 Million Customers: What You Need to Know”
The London Drugs Ransomware Breach: A Comprehensive Review of Impact and Response
In Western Canada, London Drugs a well-known pharmacy and retail chain fell victim to a major cyberattack in April 2024. As a result, nearly 80 of its stores across Manitoba, Saskatchewan, British Columbia, and Alberta were closed for more than seven days. This incident demonstrated how serious a risk cyberattacks have grown to be for …
Continue reading “The London Drugs Ransomware Breach: A Comprehensive Review of Impact and Response”
Security in Popular Messaging Apps (WhatsApp vs Telegram): A Comparative Analysis
By Ndifreke Ating, Suraj Aderoju, and Dag-Emmanuel Ankrah Message-based applications have become a crucial element of our everyday communication in the digital era. With billions of users each, WhatsApp and Telegram are two of the most widely used messaging services worldwide for both personal and business communication. Examining how these applications do in terms of …
Continue reading “Security in Popular Messaging Apps (WhatsApp vs Telegram): A Comparative Analysis”
Crib-Draggle: A Better, Gamified, Crib-Drag Program
Background The One Time Pad (OTP) has been a staple of the cryptography community ever since it was invented; publications such as Academic Accelerator even claim that the method “in cryptography is an encryption technique that cannot be broken”[5]. As learned in class, the use of OTP requires a sequence of key bits (or Pad) …
Continue reading “Crib-Draggle: A Better, Gamified, Crib-Drag Program”