Robert Diab, Thompson Rivers University Despite early predictions that the internet would spell the end of privacy, it continues to be vital to who we are. Without privacy, we couldn’t sustain relationships or maintain our dignity or sense of self. Yet our privacy is constantly threatened by ubiquitous surveillance and data collection by tech platforms,… Continue reading It’s not the end of privacy yet in Canada, but the threat remains
Harden Web Server for Security
Web servers are a critical component of any web application and therefore need to be hardened to prevent unauthorized access, data breaches, and other security threats. Here are some tips that can help you harden your web server: By implementing these tips, you can significantly increase the security of your web server and reduce the… Continue reading Harden Web Server for Security
Be Safe With Passwords
As we increasingly rely on the internet for everything from banking to socializing, the importance of website password security cannot be overstated. Your passwords are the keys to your online identity and personal information, and weak or easily guessable passwords can leave you vulnerable to cyber attacks and identity theft. In this blog post, we’ll… Continue reading Be Safe With Passwords
Hunting hackers: An ethical hacker explains how to track down the bad guys
Timothy Summers, University of Maryland When a cyberattack occurs, ethical hackers are called in to be digital detectives. In a certain sense, they are like regular police detectives on TV. They have to search computer systems to find ways an intruder might have come in – a digital door or window left unlocked, perhaps. They… Continue reading Hunting hackers: An ethical hacker explains how to track down the bad guys
As digital threats grow, will cyber insurance take off?
Nir Kshetri, University of North Carolina – Greensboro Cyberattacks cost the world more than natural disasters – US$3 trillion in 2015, a price that may climb to $6 trillion annually by 2021 if present trends continue. But most people – and even most businesses – don’t have insurance to protect themselves against this rising threat.… Continue reading As digital threats grow, will cyber insurance take off?
When the Internet goes down
Hervé Debar, Télécom SudParis – Institut Mines-Télécom “A third of the Internet is under attack. Millions of network addresses were subjected to distributed denial-of-service (DDoS) attacks over two-year period,” reports Warren Froelich on the UC San Diego News Center website. A DDoS is a type of denial-of-service (DoS) attack in which the attacker carries out… Continue reading When the Internet goes down
Australia needs a robust cybersecurity overhaul – not whack-a-mole bans on apps like TikTok
Lyria Bennett Moses, UNSW Sydney Australia has joined other countries in announcing a ban on the use of TikTok on government devices, with some states and territories following suit. The rationale was based on security fears and, in particular, the risk the platform will be used for foreign interference operations by China. TikTok is a… Continue reading Australia needs a robust cybersecurity overhaul – not whack-a-mole bans on apps like TikTok
What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past
Sayonnha Mandal, University of Nebraska Omaha Passwords could soon become passé. Effective passwords are cumbersome, all the more so when reinforced by two-factor authentication. But the need for authentication and secure access to websites is as great as ever. Enter passkeys. Passkeys are digital credentials stored on your phone or computer. They are analogous to… Continue reading What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past
What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past
Sayonnha Mandal, University of Nebraska Omaha Passwords could soon become passé. Effective passwords are cumbersome, all the more so when reinforced by two-factor authentication. But the need for authentication and secure access to websites is as great as ever. Enter passkeys. Passkeys are digital credentials stored on your phone or computer. They are analogous to… Continue reading What are passkeys? A cybersecurity researcher explains how you can use your phone to make passwords a thing of the past
Banning TikTok could weaken personal cybersecurity
Robert Olson, Rochester Institute of Technology TikTok is not be the first app to be scrutinized over the potential exposure of U.S. user data, but it is the first widely used app that the U.S. government has proposed banning over privacy and security concerns. So far, the discussion has focused on whether TikTok should be… Continue reading Banning TikTok could weaken personal cybersecurity