Search related to security attacks
July 1, 2017
Face it: Hackers Gonna Hack. How to know if you’ve been hacked?
-
Your friends tell you. They’ve received a spammy or phishy e-mail from your account.
June 9, 2017
Stop and think for a minute about how much information about you is online right now: Do you have a Facebook page? What about LinkedIn? Did you post any tweets today, or retweet someone else's message? Have you been part of an event where there are pictures of you or does your name appear in a participant list? Written any blogs or responded with comments to news articles? Filled out any online petitions?
May 1, 2017
The Royal Canadian Mounted Police (RCMP) has released a bulletin to raise awareness on Ransomware - how to recognize, reject and report it. This bulletin was prepared by the RCMP in consultation with law enforcement partners.
This is the first in a series of bulletins designed to raise awareness of emerging criminal threats enabled by technology.
February 24, 2017
A 'watering hole attack' involves hijacking a legitimate and trusted site, typically by exploiting a 0-day vulnerability, to push malware to unsuspecting users. The intent is to use that well known site (the watering hole) to infect a specific user or user group with malware.
Facebook, Apple, Microsoft, Twitter, and most recently banks, have all been targeted with watering hole attacks.
January 10, 2017
"Want to know your Star Wars character name? Your Professional Wrestling Name? Your My Little Pony name? Just take your birth month, or the street name of the first house you lived in, the city you were born in, your mother’s maiden name, name of your childhood best friend, first name of your spouse’s father and post them below."
October 28th, 2016
The Internet of Things is a hot topic these days. From your internet enabled thermostat, doorbell, bike lock, front door, to your dog monitoring camera; connected or smart devices are everywhere and your house may be full of them.
September 30, 2016
We’ve all encountered this at some point; you’re walking down the street, or sit down at your local coffee shop, and find a USB stick. Maybe it has a label on it that reads “Financial Records”, “HR Data” or “Personal”, and it piques your curiosity. So you plug it in to your computer. At that point the damage could already be done.