Security experts can provide valuable information on vulnerabilities that could be exploited in cyberattacks.
Cyberattacks are on the rise. Canada needs to work with cybersecurity experts to enable them to identify and address security vulnerabilities.
Mobile apps on smartphones are threats to digital privacy
Yasuyoshi Chiba/AFP via Getty Images
Parties who design the technologies and platforms on which mobile apps are built and marketed must be brought within the legal accountability framework to close the privacy loop.
International power plays are a threat to a stable, open internet.
erhui1979/DigitalVision Vectors via Getty Images
The US is wrestling with the rest of the world for control of the internet. The ‘net as we know it could be a victim of the struggle.
It’s reported the Pegasus spyware can capture a user’s keystrokes, intercept communications, track their device and tap into their camera and microphone.
Cybersecurity is a growing global threat.
A UN working group on cybersecurity is making incremental progress in highlighting the importance of including and protecting civilians.
The two leaders ignored the most pressing global issue to concentrate on the status quo issues of security and arms control.
The first ransomware attack, in 1988, was a crude effort involving virus-laden floppy disks. But in the decades since, the sophistication of malware, and the money reaped by criminals, has skyrocketed.
The recent attack on software supplier Kaseya has been labelled as the biggest global ransomware attack on record.
Cyberwarfare will require new defensive measures by government and corporations.
Co-ordinated cyberattacks can create massive disruptions to infrastructure and supply chains. New treaties are needed to prevent cyberwarfare, but it’s challenging to predict technological advances.
The hacktivist collective ‘Anonymous’ has become just that – but the hacktivism they espoused may be set to return.
Credit bureau Equifax announced in 2017 that the personal information of 143 million Americans – about three-quarters of all adults – had been exposed in a major data breach.
AP Photo/Mike Stewart
If an organization that has your data gets hacked, your vulnerability depends on the kind of attack and the kind of data. Here’s how you can assess your risk and what to do to protect yourself.
This could have been a feisty exchange between two adversaries. But the summit was a calm affair, with each side hoping their hostile relationship could be ratcheted down a notch or two.
Colonial Pipeline storage tanks. On May 7, 2021, the company experienced a ransomware cyberattack.
(AP Photo/Seth Wenig)
The amount of online data and transactions are growing exponentially. Related is the increasing possibility of cyberattacks — one way to address these is by regulating parts of the internet.
Your move, Mr. President.
AP Photo/RIA Novosti, Alexei Druzhinin
When announcing financial penalties on Russia earlier this year, Biden hinted at the prospect of ‘further’ sanctions. An energy scholar explains what Biden may have meant.
It doesn’t take a human mind to produce misinformation convincing enough to fool experts in such critical fields as cybersecurity.
iLexx/iStock via Getty Images
Bots flooding social media with fake news about politics is bad enough. Muddying the waters in such fields as cybersecurity and health care could put lives at risk.
Maksim Shmeljov / Shutterstock
Cybersecurity for pipelines and ports is too important to leave unregulated.
What would happen if companies stopped paying ransoms?
Liu Jie/Xinhua via Getty Images
The FBI and Treasury Department frown on the idea of paying off cyber attackers. But there is sufficient ethical and legal gray areas to make it a real moral quandary for business leaders.
In its inaugural contest, the Tianfu Cup produced an iPhone hack that was allegedly used to spy on China’s Uyghur minority.
For cybersecurity, your best bet is to assume that the enemy has already slipped inside.
clu/DigitalVision Vectors via Getty Images
Most people think of trust as active – you place your trust in someone or you don’t. But weak cybersecurity, like leaving your front door unlocked, is a matter of trust, too.
People have plenty of legitimate reasons to use encrypted communications platforms such as WhatsApp or Signal for their own security and privacy.