Cryptojacking is a recent phenomenon in the incidences of cyber security breach. It essentially is tied up with mining of crypto currency, so let us first understand what that is and then turn to cryptojacking again.
Like most other countries, Canada has a legal framework to protect the private information about its citizens.
With the explosion of information and easy connectivity across global computers, information security plays a very crucial role for individuals and companies alike.
Web browsers are software applications that are used to access information from the World Wide Web. As the popularity of smart phones grows, the use of web browser has increased too. Over the years, leading companies that offer web browsers (Chrome, Firefox, Internet Explorer and Opera, to name a few) have enhanced the functionality of their web browsers.
In the last article, we saw how miscreants exploit browser architecture vulnerabilities to target unsuspecting victim. In the second installment of browser vulnerabilities, we will explore other means whereby browser integrity is compromised to target users.
In one of the earlier article we learned what Cryptography is, and how it is increasingly used for data transmissions and telecommunication. In terms of cyber security, the Internet is especially vulnerable as it transmits data over an untrusted medium.
Information security was not a serious concern in Canada in the 1970s. Yes, there were hackers at that time as well, but a majority of the cyber attacks were more for bragging rights rather than personal gains.
Like the Systems Development Life Cycle, the Information Security Development Life Cycle (ISDLC) also follows almost the same path.
The phenomenal growth in the use of internet has raised concerns about cyber security. In Canada and elsewhere, companies that provide cyber security / information security services are in demand. There are various types of cyber security threats; we will cover them in this cyber security primer in two parts. The first part discusses about malware, the second discusses about e-mail related threats.
In the previous article Since they have been introduced, e-mails have changed the way people communicate. Gone are the days of snail mail, when letters used to take days to be delivered. More, if you were to send international mail. The prolific use of e-mails has brought about its own share of security threats. Here are a few concerns that need to be addressed while dealing with e-mail.
The spread of Internet has revolutionized the way in which businesses are conducted. The use of e-mails, instant messages and web applications has improved communication vastly.
Information technology (IT) is the combination of computing and communications. IT really came into age with the advent of electronics. The development of ENIAC heralded the development of computers, and IT never saw back.
Cyber hacking is on the rise. Interception of messages, important e-mails and snooping is increasingly common nowadays. Companies that are aware of cyber risk are turning to cryptography to protect their valuable data. Indeed, not only in Canada, but in other countries too, more and more companies are turning to information security providers to provide data encryption services.
Canada is the second largest country in the world. It is home to a vibrant and diverse economy.
Canada is the world’s second largest country. Located in the continent of North America, Canada is divided into 10 provinces and 3 territories.