Contest Solution Revealed

At SecTor 2019 we ran another exciting Capture the Flag (CTF) contest with something for everyone, from novices to experts alike. With a special thanks to Dolos Group for setting up and running the CTF, and Nuix for their support, it was one of the best we’ve seen to date. Congratulations to all who participated, […]

Read more

SecTor 2020 Plans Begin!

When we founded SecTor, we did it because we were regular attendees of Black Hat, Defcon and several other US based events and we were frustrated that Canada had nothing of the sort. We started SecTor both to bring the best and most important security researchers from around the world to Canada, and to showcase […]

Read more

How To Get The Most From Your First Cybersecurity Conference

When it comes to cybersecurity conferences, DEF CON is one of the most daunting. It’s huge, busy, and filled with experts, many of whom already know each other. So when Laylee Olsen ventured there for the first time, she was understandably a little nervous. It was the first ever cybersecurity conference for 30-year-old Olsen, a […]

Read more
What Data Breaches and Climate Change Have in Common

What Data Breaches and Climate Change Have in Common

If you feel powerless to protect your data—and other peoples’—against an onslaught of cyberattacks, you’re not alone. In March, Cisco’s 2019 CISO Benchmark Study surveyed 3,259 IT security pros around the world. It found that 30% of them suffered from cyber fatigue, a condition which it describes as “having virtually given up trying to stay […]

Read more
Shoul You Pay An Online Ransom?

Should You Pay An Online Ransom?

If you weren’t convinced that data is one of your most valuable assets, just look at how often criminals are locking it up and holding it to ransom. Ransomware attacks have become an epidemic, hitting targets ranging from schools to government offices, and even hospitals. Ransomware attacks are especially endemic among governments. Recently, 22 government […]

Read more
Why Cloud Data Keeps Getting Exposed

Why Cloud Data Exposures Keep Happening

Finding online data exposures is like shooting fish in a barrel—assuming that you’re using an M65 cannon with a nuclear payload. New and horrific breaches emerge every week. In the last couple of weeks alone, we’ve seen several, each violating privacy and security in different ways. Some expose internal information that could be useful to […]

Read more

What Online Application Flaws Should You Be Worried About?

What application vulnerabilities should you be worried about when protecting your organization? Well, all of them, of course, but some more than others. Bug bounty company HackerOne recently analyzed the 120,000 vulnerabilities that researchers have reported through its platform to highlight the most common and highest-earning flaws. HackerOne organizes community bug-finding programs for top brands […]

Read more
Help the Security Effort By Becoming an IoT Researcher

Help the Security Effort By Becoming an IoT Researcher

For UK users concerned about their connected devices leaking personal data, help may be on the way. Fed up with the Internet of things (IoT) industry’s failure to self regulate, the UK government is preparing to govern the privacy and security consumer of devices itself. It just released a consultation document that lays out a […]

Read more
Here's How We Know Exactly What Alexa Is Hearing

Here’s How We Know Exactly What Alexa Is Hearing

When you talk to Amazon’s Alexa, it isn’t only a cloud-based digital assistant that listens. This week, Bloomberg reported that humans are listening in on your Alexa recordings to better train the system. These workers include not just full-time Amazon employees, but international contractors. They even have online chat rooms where they replay the recordings […]

Read more

Why Hackers Love Lock Picking So Much

What is it with hackers and lock picking? Lock picking workshops have sprung up at various conferences including Hackers on Planet Earth (HOPE), DEF CON, and of course our own SecTor conference. For years now, Schuyler Towne has been visiting Toronto each fall to help attendees learn how to break a variety of locks with […]

Read more
This Hacker Could Pwn Your Home Network in 60 Seconds

This Man Can Hack Your Home Network in 62 Seconds

When you next go to watch Game of Thrones on your Chromecast, don’t be surprised if you see something entirely unexpected pop up on your screen instead. Tripwire’s principal security researcher Craig Young took some time away from running the IoT Hack Lab at SecTor 2018 to show us how someone could get inside your […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!
Fields marked with an * are required