Spy agency flags possible security breaches at Canadian pandemic research facilities

Posted by & filed under Cyber Security, Cyberattack.

Canada’s cyber spy agency says authorities are investigating possible security breaches at Canadian organizations doing COVID-19-related research — less than a week after it warned that Canadian intellectual property linked to the pandemic is a “valuable target” for state-sponsored actors. “We’ve seen some compromises in research organizations that we’ve been helping to mitigate and we’re… Read more »

Coronavirus: How hackers are preying on fears of Covid-19

Posted by & filed under Cyber Security, Cyberattack, Phishing.

Security experts say a spike in email scams linked to coronavirus is the worst they have seen in years. Cyber-criminals are targeting individuals as well as industries, including aerospace, transport, manufacturing, hospitality, healthcare and insurance. Phishing emails written in English, French, Italian, Japanese, and Turkish languages have been found. Source: BBC Technology News Date: March… Read more »

3 Things We Can All Learn from Microsoft’s Cloud Data Breach

Posted by & filed under Career, Cyber Security, Microsoft.

After Microsoft announced a cloud data breach that resulted in the accidental exposure of 250 million customer support records last week, cloud misconfiguration issues once again burst into the cybersecurity spotlight. On the bright side, Microsoft launched a model response, illustrating how a quick and effective reaction can preserve the public’s trust and prevent a media disaster… Read more »

Israeli soldiers duped by Hamas ‘fake women’ phone ruse

Posted by & filed under Cyber Security, Cyberattack, Phishing.

Dozens of Israeli soldiers have had their smartphones hacked by the Hamas militant group posing as women seeking attention, Israel’s military says. A spokesman said the soldiers were sent fake photos of young females and lured into downloading an app without knowing it could access their handsets. He said there was no “significant breach of… Read more »

Personal information belonging to 144,000 Canadians breached by federal departments and agencies

Posted by & filed under Cyber Security.

Federal departments or agencies have mishandled personal information belonging to 144,000 Canadians over the past two years, according to new figures tabled in the House of Commons — and not everyone who was swept up in a privacy breach was told about it. The new figures were included in the federal government’s answer to an order paper… Read more »

How ransomware insurance that protects companies and communities can also embolden criminals

Posted by & filed under Cyber Security, Cyberattack, Ransomware.

To town councillors in Essex, Ont., it sounded like an expensive, if necessary, proposal. At a public meeting last August, the town’s insurance provider pitched a new type of policy that he said a growing number of municipalities are buying: coverage against cyberattacks. “By purchasing this layer of protection, you can have a little peace of… Read more »

How may I help you? Virtual Shopping Assistants

Posted by & filed under AI/Artificial Intelligence, Augmented Reality, Cyber Security, Emerging Technologies.

Source: BBC Technology News Date: January 16th, 2020 Link: http://www.bbc.co.uk/news/resources/idt-sh/disruptors_how_may_I_help_you Discussion 1) “In the brave new world of retail this won’t necessitate a trek out to the nearest late night supermarket. Instead the shop can come to you.  With the touch of an app button, you hail a low-slung electric vehicle, like a glass-sided motorhome, which quietly glides into… Read more »

Fraudsters almost swindled the Royal Canadian Mint with payroll ‘spoofing’ scam

Posted by & filed under Cyber Security, Phishing.

The Royal Canadian Mint fell for what’s known as a “spear-phishing” scam and almost forked over an employee’s paycheque to fraudsters, according to a breach report obtained through access to information. Spear-phishing is a type of fraud which sees swindlers carefully collect information on a target in order to impersonate them. It’s one of the “most common and most dangerous… Read more »