What Data Breaches and Climate Change Have in Common

What Data Breaches and Climate Change Have in Common

If you feel powerless to protect your data—and other peoples’—against an onslaught of cyberattacks, you’re not alone. In March, Cisco’s 2019 CISO Benchmark Study surveyed 3,259 IT security pros around the world. It found that 30% of them suffered from cyber fatigue, a condition which it describes as “having virtually given up trying to stay […]

Read more
Shoul You Pay An Online Ransom?

Should You Pay An Online Ransom?

If you weren’t convinced that data is one of your most valuable assets, just look at how often criminals are locking it up and holding it to ransom. Ransomware attacks have become an epidemic, hitting targets ranging from schools to government offices, and even hospitals. Ransomware attacks are especially endemic among governments. Recently, 22 government […]

Read more
Why Cloud Data Keeps Getting Exposed

Why Cloud Data Exposures Keep Happening

Finding online data exposures is like shooting fish in a barrel—assuming that you’re using an M65 cannon with a nuclear payload. New and horrific breaches emerge every week. In the last couple of weeks alone, we’ve seen several, each violating privacy and security in different ways. Some expose internal information that could be useful to […]

Read more

What Online Application Flaws Should You Be Worried About?

What application vulnerabilities should you be worried about when protecting your organization? Well, all of them, of course, but some more than others. Bug bounty company HackerOne recently analyzed the 120,000 vulnerabilities that researchers have reported through its platform to highlight the most common and highest-earning flaws. HackerOne organizes community bug-finding programs for top brands […]

Read more
Help the Security Effort By Becoming an IoT Researcher

Help the Security Effort By Becoming an IoT Researcher

For UK users concerned about their connected devices leaking personal data, help may be on the way. Fed up with the Internet of things (IoT) industry’s failure to self regulate, the UK government is preparing to govern the privacy and security consumer of devices itself. It just released a consultation document that lays out a […]

Read more
Here's How We Know Exactly What Alexa Is Hearing

Here’s How We Know Exactly What Alexa Is Hearing

When you talk to Amazon’s Alexa, it isn’t only a cloud-based digital assistant that listens. This week, Bloomberg reported that humans are listening in on your Alexa recordings to better train the system. These workers include not just full-time Amazon employees, but international contractors. They even have online chat rooms where they replay the recordings […]

Read more

Why Hackers Love Lock Picking So Much

What is it with hackers and lock picking? Lock picking workshops have sprung up at various conferences including Hackers on Planet Earth (HOPE), DEF CON, and of course our own SecTor conference. For years now, Schuyler Towne has been visiting Toronto each fall to help attendees learn how to break a variety of locks with […]

Read more
This Hacker Could Pwn Your Home Network in 60 Seconds

This Man Can Hack Your Home Network in 62 Seconds

When you next go to watch Game of Thrones on your Chromecast, don’t be surprised if you see something entirely unexpected pop up on your screen instead. Tripwire’s principal security researcher Craig Young took some time away from running the IoT Hack Lab at SecTor 2018 to show us how someone could get inside your […]

Read more
How Browser Extensions Can Ruin Your Life

How Browser Extensions Can Ruin Your Life

You may trust your browser, but do you trust what it’s running? At SecTor 2018, threat intelligence specialist Lilly Chalupowski demonstrated why you shouldn’t. Browser extensions are the small applications that your browser installs to provide extra features. These can do anything from translating web sites to letting you download videos from streaming sites. These […]

Read more
What Happens To Your Bitcoin After You Die

What Happens To Your Bitcoin After You Die?

Your last will and testament used to focus on things like physical property and cash in the bank. Now in a world of digital assets, that’s all changing. Jennifer Robertson should know. She was the partner of Canadian cryptocurrency entrepreneur Gerald Cotten. Cotten, who founded cryptocurrency exchange QuadricaCX, passed away in India in early December […]

Read more
Brian Bourne

SecTor CFP Selection Process

An update from Brian Bourne, co-founder of SecTor. We are regularly asked how to have a talk accepted at SecTor. We strive to give every submission the diligence it deserves and as the conference has grown, we have moved from simple email submissions to a submission portal at sector.ca/cfp. The portal allows us to make […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!