Park’N Fly Data Breach Affects 1 Million Customers: What You Need to Know

Canadian off-airport parking service provider Park’N Fly is notifying 1 million customers of a security incident involving their personally identifiable information. On August 23, 2024, Park’N Fly reported a significant data breach that compromised approximately 1 million customer records. The affected customers were notified via email about the breach. Park’N Fly, which offers 24/7 parking …

The London Drugs Ransomware Breach: A Comprehensive Review of Impact and Response

In Western Canada, London Drugs a well-known pharmacy and retail chain fell victim to a major cyberattack in April 2024. As a result, nearly 80 of its stores across Manitoba, Saskatchewan, British Columbia, and Alberta were closed for more than seven days. This incident demonstrated how serious a risk cyberattacks have grown to be for …

Security in Popular Messaging Apps (WhatsApp vs Telegram): A Comparative Analysis

By Ndifreke Ating, Suraj Aderoju, and Dag-Emmanuel Ankrah Message-based applications have become a crucial element of our everyday communication in the digital era. With billions of users each, WhatsApp and Telegram are two of the most widely used messaging services worldwide for both personal and business communication. Examining how these applications do in terms of …

Crib-Draggle: A Better, Gamified, Crib-Drag Program

Background The One Time Pad (OTP) has been a staple of the cryptography community ever since it was invented; publications such as Academic Accelerator even claim that the method “in cryptography is an encryption technique that cannot be broken”[5]. As learned in class, the use of OTP requires a sequence of key bits (or Pad) …

Future of Account Sign-in and Website Identification Using Cryptography

Filipp Gorodkov|Valentine Adjei|Enyu Ma|Ishak Lutalo Nkonge|Kelvin Onome Otuagoma The usage of usernames and passwords for authentication has become a critical vulnerability within the cybersecurity landscape. Despite substantial efforts by different organizations and cybersecurity experts to improve the security of usernames and passwords for authentication, data breaches keep happening. In addition to this, the mental cost …

Lightweight Cryptography: The go-to Cryptography for IoT Security 

Charles Odunaiya, Dev Patel, Harsh Patel, Nina Onwuachi, Saniya Jabir Internet of Things (IoT)   Buzzwords like Smart cities, Smart homes, and Smart Wearables have recently gained popularity on all fronts, both on social media and traditional platforms. The technical description of these words is the Internet of Things (IoT). According to Thakor et al. …

Decentralized Dilemmas: A Blockchain Jeopardy Challenge

Group: Angelica Hizsa, Teddy Kalp, Lisa Muli The practice of securing communication by transforming plaintext into unreadable ciphertext, and vice versa, using mathematical algorithms and secret keys…What is Cryptography? Introduction So… Let’s talk about the exciting world of Cryptography, demystify the belief of its complexity, build on fundamental knowledge and challenge you to learn more …

Instant Messaging Applications & Cryptography

“Communication is the essence of human life” ~Janice Light[1] Instant messaging is a set of technologies that facilitate real-time communication. Also known as I.M., social messengers, messaging apps or chat apps, it is a quick, accessible, and convenient mode of communication. Instant messaging pre-dates the modern internet and has existed since the early 1990s. However, …

A heart for WirelessHART

by Stephen Penner, Ben Etukudoh, Oluchi Henry-Ucheonwu, Julie Stiehl (edited) Introduction  This is our first attempt to explore the world of WirelessHART, to have a clearer perspective of what it is and how it works with a focus on data integrity and security. We also examine this protocol with reference to Wi-Fi alliances latest standards …

An Introductory Guide to Private PKI Implementation for Secure Internal Server Communication

Group 1: Leo Choi, David St Louis, Nina Undug, Janelle Wiebe & Jamie Wong Many business operations employ public-key cryptography to uphold client privacy rights during the transportation of sensitive data. In public-key cryptography, messages are encrypted using the receiver’s public key, which is publicly available. Consider the following man-in-the-middle attack that may result from …