The Tim Hortons mobile app created a “a mass invasion of Canadians’ privacy” by conducting continuous location tracking without user consent even when the app was closed, what is a social engineering kill-chain and how can this help understand and prev…
Tag: technology
Global IT News
John Tory addresses talent retention and social support at Collision 2022
by Tom Li •
Toronto mayor John Tory opened the Collision 2022 event in Toronto with a question and answer session on June 21, addressing a few pressing issues around social support and talent retention in the tech sector. Canada has had an issue with losing talent to the U.S. due to more lucrative opportunities there. On that point,
Europe, Global Security News, North America
Bipartisan Digital-Privacy Bill, Delete Your Data Before Selling Your Car, Firefox Total Cookie Protection
by Tom Eston •
A new bipartisan privacy bill, the American Data Privacy and Protection Act, “could” be the first privacy legislation in the US not doomed to fail, a story about why you should delete your location and private data in your car’s navigation system befor…
Europe, Global Security News, North America
Hacking Ham Radio: Why It’s Still Relevant and How to Get Started
by Tom Eston •
This week we discuss hacking ham radio with special guests Caitlin Johanson, Rick Osgood, and Larry Pesce. In this episode you’ll learn what ham radio is, why its still relevant, why would attackers want to hack ham radio, all about packet radio and AP…
Security Bloggers
How Good is DALL·E at Creating NFT Artwork?
by Daniel Miessler •
If you’ve not heard, there are these things called NFTs. I think they’re simultaneously the future of digital signaling and currently mostly hype. But whatever—that’s not what this post is about. Most NFTs rotate around a piece of collectible art in a baseball card-like format. So you look at something like the Bored Ape Yacht Club, and it’s…
Security Bloggers
How Good is DALL·E 2 at Creating NFT Artwork?
by Daniel Miessler •
If you’ve not heard, there are these things called NFTs. I think they’re simultaneously the future of digital signaling and currently mostly hype. But whatever—that’s not what this post is about. Most NFTs rotate around a piece of collectible art in a baseball card-like format. So you look at something like the Bored Ape Yacht Club, and it’s…
Security Bloggers
How Good is DALL·E 2 at Creating NFT Artwork?
by Daniel Miessler •
If you’ve not heard, there are these things called NFTs. I think they’re simultaneously the future of digital signaling and currently mostly hype. But whatever—that’s not what this post is about. Most NFTs rotate around a piece of collectible art in a baseball card-like format. So you look at something like the Bored Ape Yacht Club, and it’s…
Global IT News
Non-profit tech supplier transforms model to better serve NGOs
by Samira Balsara •
The non-profit TechSoup, a supplier and distributor of tech equipment and financial resources to non government organizations (NGOs), is partnering with consultants at the Alexander Group to continue evolving their model to more holistically support NGOs around the world. Beginning in 2019, San Fransisco based-TechSoup, whose Canadian partner is the Centre for Social Innovation, and […]
The post Non-profit tech supplier transforms model to better serve NGOs first appeared on IT World Canada.
Europe, Global Security News, North America
Why Getting Hacked Is Just What Your Organization Needs
by John P. Gormally, SR •
Why Getting Hacked Is Just What Your Organization Needs
Why do the CFO(Chief financial officer), COO(Chief operating officer, CIO(Chief information officer), and CRO(Chief risk officer) need to report to CISO(Chief information security officer), not t…
Europe, Global Security News, North America
DuckDuckGo Browser Allows Microsoft Trackers, Stolen Verizon Employee Database, Attacking Powered Off iPhones
by Tom Eston •
The DuckDuckGo mobile browser allows Microsoft trackers due to an agreement in their syndicated search content contract, a database of contact details for hundreds of Verizon employees was compromised after an employee was social engineered to give the…
Europe, Global Security News, North America
The State of Application Security with Tanya Janca
by Tom Eston •
Tanya Janca, founder of the We Hack Purple Academy, Director of Developer Relations and Community at Bright, and author of “Alice & Bob Learn Application Security” joins us to discuss the current state and future of Application Security. In this ep…
Security Bloggers
Newsletter Analysis: What My Favorite Newsletters Have in Common
by Daniel Miessler •
I read a lot of newsletters as part of my content consumption workflow, and since I have my own newsletter as well (started in 2015 before it was cool!), I’m hyper-curious about what works and what doesn’t. More specifically, I see lots of similar tricks being used across the 20-or-so that I subscribe to. These are things like…
Europe, Global Security News, North America
Apple Mail Privacy Protection, Government Agencies Reveal Top Attack Vectors, Is Big Brother Watching You at Work?
by Tom Eston •
What is Apple Mail Privacy Protection and how does it hide your IP address, so senders can’t link it to your online activity or determine your location, government authorities such as the FBI and NSA have released a list of top attack vectors used to g…
Europe, Global Security News, North America
Cybersecurity for Startups with Josh Feinblum from Stavvy
by Tom Eston •
Josh Feinblum is the co-founder of Stavvy, a Boston-based fully integrated digital mortgage platform, where he leads product, engineering, people, and finance. He also serves as a venture partner at F-Prime Capital, where he evaluates and advises start…
Security Bloggers
Why I’m Not Worried About Elon Musk Buying Twitter
by Daniel Miessler •
I’m evidently in the minority, but my first reaction to Elon Musk buying Twitter was a positive one. I could be wrong because I don’t know what they’ve watched. And I think I know why there’s a disconnect between me and many of my tech-peers on Twitter. In short, I’m watching a lot of what Elon actually says,…
Europe, Global Security News, North America
Elon Musk Buys Twitter, Forgotten BIOS Updates, T-Shirt Outwits Facial Recognition
by Tom Eston •
Elon Musk buys Twitter for $44 billion so what does this mean for the privacy and cybersecurity of the platform? More than 100 different Lenovo laptop computers contain firmware-level vulnerabilities which is a great reminder about making sure you upda…
Europe, Global Security News, North America
Rehumanizing Cybersecurity with Lianne Potter
by Tom Eston •
Award-winning security transformation manager and digital anthropologist Lianne Potter joins us to discuss the fascinating topic of digital anthropology and how we can rehumanize cybersecurity. In this episode Lianne discusses how she became a digital …
Security Bloggers
Removing ^M Characters
by Daniel Miessler •
You’re here because you have something like the above in your text files, and it’s driving you towards violence. The universe sent you here so I can help you. You’re welcome. The prescribed fix is this: sed -e ‘s/^M//’ If that worked you wouldn’t be here. The actual fix is this: tr -d ‘\r’ Bonus on this one:…
Europe, Global Security News, North America
Dumbphone Sales are Soaring, John Oliver Blackmails Congress, Cicada Chinese APT Group
by Tom Eston •
More young people seem to be choosing dumbphones over smartphones, but is it because of privacy concerns or because its trendy? John Oliver, host of the ‘Last Week Tonight’ show, used data brokers to obtain lawmakers’ digital footprints and promised to…
Security Bloggers
A Quick Thought on Musk Buying Twitter
by Daniel Miessler •
My first thought on the whole discussion is that I’m not sure what Musk is arguing exactly. If he is arguing that Twitter should be treated more like a public square where you can have center and right views be voiced without concern, then I get that. But I think there’s confusion there. There are plenty of center…
Europe, Global Security News, North America
Cyberwar and Cyberterrorism: What is the Difference?
by Gabor •
Introduction The terms cyberwarfare and cyberterrorism are both used since the 1990s for describing adverse events in cyberspace. Even though the three-decade history of cyberwarfare and cyberterrorism, academic communities could not agree on a widely…
Europe, Global Security News, North America
Truths and Myths of Privacy, Fake Shopping Apps, Borat RAT Malware
by Tom Eston •
Scott and Tom explain why privacy isn’t dead, why should everyone should care about their privacy, and how you should respond to someone that says “I don’t care about privacy, I have nothing to hide!”. Plus, details on a new attack using fake shopping …
Europe, Global Security News, North America
Why Now Is the Time to Prepare for The Quantum Threat
by News team •
Quantum computers are set to bring about many changes to cybersecurity and beyond, but why should companies start […]
The post Why Now Is the Time to Prepare for The Quantum Threat appeared first on Cyber Defense Magazine.
Europe, Global Security News, North America
The Quantum Tipping Point
by News team •
Fixing Cryptography Before It Is Broken By Carmen Kempka, Head of Corporate Technology, WIBU-SYSTEMS AG Ever since Peter […]
The post The Quantum Tipping Point appeared first on Cyber Defense Magazine.
Security Bloggers
My Custom Contact Sharing Solution
by Daniel Miessler •
I’ve been excited recently about the prospect of attending some cons this summer. One of the things that sucks most about cons, or about meeting new people in general, is sharing information with them. Paper cards are kind of done. And while there a ton of apps for doing contact sharing, they all require you to sign up…
Global IT News
What are QR codes and how do they work?
by Tom Li •
When it comes to scan and go technology, there’s perhaps nothing more ubiquitous than QR codes. These blotches of squares exist in almost everywhere. In a business setting, QR codes can be used for authentication, to log into Wi-Fi networks, hold storefront payment information, and much more. They are also used to prevent forgery, increase […]
The post What are QR codes and how do they work? first appeared on IT World Canada.
Europe, Global Security News, North America
LAPSUS$ Hacks Okta, Browser-in-the Browser Phishing Attack, Popular Software Package Updated to Wipe Russian Systems
by Tom Eston •
The LAPSUS$ hacking group has claimed to have hacked both Microsoft and Okta, details about a novel phishing technique called a browser-in-the-browser (BitB) attack, and how a popular software package that has 1.1 million weekly downloads released a ne…
Europe, Global Security News, North America
5 Ways Cybersecurity Will Change In 2022
by News team •
By Jaime Coreano, Vice President of Sales – Flexxon The annual cost of cybercrime is set to hit […]
The post 5 Ways Cybersecurity Will Change In 2022 appeared first on Cyber Defense Magazine.
Security Bloggers
The Actual Pronunciation of GIF, from the Creator
by Daniel Miessler •
The pronunciation of GIF is one of the oldest and most aggressive internet debates. Some of these will never be settled, but luckily with the GIF debate there’s an actual answer. The creator of the GIF, Steve Wilhite, not only pronounces it as “jif”, but he says that’s is the only proper way to say it. The image…
Europe, Global Security News, North America
Importance of Securing Software with a Zero Trust Mindset
by The ShiftLeft Team •
By Shinesa Cambric, Microsoft
This article is part of a series showcasing learnings from the Secure Software Summit.
Photo by Morgane Perraud on Unsplash
With the increase of supply chain attacks on everything from logging software like Log4J to takeov…
Europe, Global Security News, North America
Top 3 Location Tracking Apps: Do They Sell Your Data?
by Tom Eston •
This week we discuss the top 3 location tracking apps in the Apple App Store and Google Play and which ones sell your data. Plus, details about recent fake Chick-fil-A and Olive Garden vouchers on Facebook. ** Links mentioned on the show ** #1 Phone Tr…
Security Bloggers
Google Has Opened the Door To Cloudflare
by Daniel Miessler •
I’ve been complaining for years about Google’s various UI/UX problems. As the most recent example, I got a notification that I had over 10,000 views on the site yesterday. Cool. Well, except I had those views on Wednesday, and got the alert yesterday. Yes, they have a service called traffic “alerts” that doesn’t send an actual alert until…
Europe, Global Security News, North America
5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem
by News team •
Why Organizations Need to Secure Directory Services in a Hybrid Deployment from Attack Paths By Justin Kohler, Director […]
The post 5 Reasons Organizations Need Comprehensive AD Security Across Cloud and On-Prem appeared first on Cyber Defense M…
Europe, Global Security News, North America
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
by News team •
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to […]
The post Top 10 Reasons Cyber Defense Firms Should Hire Veterans appeared first on Cyber Defense Magazine.
Europe, Global Security News, North America
Top 10 Reasons Cyber Defense Firms Should Hire Veterans
by News team •
Technology expert and former military intelligence officer shares insight on the valuable skills that veterans can bring to […]
The post Top 10 Reasons Cyber Defense Firms Should Hire Veterans appeared first on Cyber Defense Magazine.
Security Bloggers
Things I Do Immediately on a New Linux Box
by Daniel Miessler •
[ February 12th, 2014 ] Here are a few things I do immediately on any new Linux server. Upload my own .vimrc so that I have jk as ESC, SPACE as my leader, and all my other tweaks. Change my shell to zsh so I have vim functionality on the command line, better autocomplete, etc. chsh -s /bin/zsh…
Europe, Global Security News, North America
Russia Gets Hacked, Microsoft 365 Credential Stuffing, McDonald’s Ice Cream Machine Hackers
by Tom Eston •
This week we discuss some of the more interesting hacks of Russian assets, technology, and more. Scott discusses recent credential stuffing attacks on Microsoft 365 accounts, and a fascinating story about ice cream machine “hackers” that are suing McDo…
Europe, Global Security News, North America
The Safest Ways for Bitcoin Trading
by News team •
By Robert Wilson, Freelancer During the year 2021, we experienced history in the cryptocurrency niche with the 3rd […]
The post The Safest Ways for Bitcoin Trading appeared first on Cyber Defense Magazine.
Security Bloggers
Crypto is Exciting Because It Changes Incentives
by Daniel Miessler •
Most of the talk around crypto is the argument around legitimacy. Is there a there there? Is it hype? Is it a fad? Is it the next internet? The second big conversation around crypto is about the tech itself. Bitcoin, ETH, and the thousands of others trying to carve a path. The way I’ve seen crypto until now…