Ransomware Attack on University Medical Center (UMC)

Introduction: At present, the healthcare system has become one of the most popular targets for cybercriminals. Cyberattacks on hospitals as well as on medical centers have increased drastically in recent years. On 26 September 2024, the University Medical Centre (UMC) Health System in Lubbock, Texas, was hit by a serious ransomware attack. This attack affected …

Breaking The Cryptosystem of Auto Keyless Entry, Canada Auto Thefts Surge.

Imagine a sunny day setting in a coffee shop, peacefully sipping your Frappuccino drink, then someone next to you hijacks your car key fob without even touching it or talking to you. A recent statistic by the Insurance Bureau of Canada (IBC) shows that auto theft insurance claims spiked to $1.5 billion in 2023 [3]. …

The Ethereum Mailing List Breach: A Wake-Up Call for Crypto Security

In July 2024, a massive incident occurred related to Ethereum’s official mailing list. The community faced a security challenge when a phishing email was sent to its subscribers which involved leaking sensitive information about the users. The attackers targeted the mailing list as it is the Key communication path for the Ethereum community. They decided …

Park’N Fly Data Breach 

Introduction  Park’N Fly is a popular airport parking service that experienced a data breach between July 11 to July 13, 2024. This company operates in several cities in Canada such as Ottawa, Montreal, Halifax, Edmonton, Toronto, Winnipeg, and Vancouver. The level of compromise was announced much later in August 2024, disclosing that about 1 million …

Post Quantum Cryptography: Kyber for Dummies

On August 13th 2024 NIST published the standards FIPS 203 (Kyber), FIPS 204 (Dilithium) and FIPS 205 (SPHINCS+) which are all quantum resistant algorithms that will soon replace those currently in use. The Kyber standard is a key encapsulation scheme which uses public key enabling and will replace the Diffie Hellman exchange. Dilithium and SPHINCS+ …

A Passwordless AND Keyless Future

What is Privileged Access Management (PAM)? Privileged Access Management (PAM) is a package of cybersecurity strategies and access management tools utilized for controlling, monitoring, and safeguarding users with privileged access permissions.[3] A PAM system ensures your computers have a secured network that is able to decrease operational complexity and protects important resources such as data, …

Redefining Data Privacy Through Apple Intelligence

In the latest iteration of Apple’s iOS and macOS software update, Sequoia introduced the company’s very own generative AI, Apple Intelligence. With this new venture into AI, Apple hopes to provide generative AI services while maintaining a strong commitment to privacy and security (Newman, 2024). At the core of this innovation is Private Cloud Compute …

An Attack on Two-Factor Authentication

Passwords have become ubiquitous in our lives as the main tool of account authentication, but relying solely on passwords is not very secure. With so many websites we use daily requiring accounts and passwords, many individuals reuse passwords or use very weak ones, like password123 [1]. If a password is reused on multiple sites, and …

Securing Canadian Research: Defending Innovation Against Cyber Threats

In today’s rapidly evolving digital landscape, there has been increase in cyber-attacks, targeting Canadian research, and intellectual property, resulting in stolen work and unauthorized patent filings. Sensitive technology research areas are targeted, with the stolen information being used in ways that threatened Canada’s national security [9]. Cyberattacks on Canadian Research As a leader in advanced …

Software has holes, and hackers will exploit the new vulnerabilities that appear daily.

Introduction Access to information seeking processing software programs that provide functionality to allow you to be connected, productive, creative, and entertained are typically installed on devices. When an attacker discovers a vulnerability, the next step is to exploit it. This allows hackers to use these weaknesses for malevolent purposes. Vulnerability in most software is a …