The Internet's Biggest Threat Is Under The Sea

The Internet’s Biggest Threat Lies Under the Sea

Something murky is going on again under the sea. In the UK, defence staff chief Sir Stuart Peach has warned that Russia has been operating ships near the undersea cables that digitally connect the US, Europe, and others. He worries that Russians cutting those cables represent “a new risk to our prosperity and way of […]

Read more
Black Friday Cybersecurity

Cybersecurity Report Card Says Retailers Must Try Harder

‘Tis the season for retailers, who face their busiest time of the year in terms of online and offline sales. This week’s US Thanksgiving shopping spree kicks off a bumper season that takes in Black Friday, Cyber Monday, Green Monday (December 11) and Free Shipping Day (Dec 15), not to mention the Christmas panic buying […]

Read more
Building botnets with the blockchain

Building Botnets on the Blockchain

Whenever a new technology comes along, it isn’t long before someone works out how to use it for nefarious purposes. The latest is the blockchain underpinning Ethereum, which is a next-generation network for running decentralized applications. At SecTor this week, security researcher Majid Malaika reveals how to use one of Ethereum’s most innovative features to […]

Read more
Winning Defense

What Winning Looks Like In Cybersecurity

Allison Miller didn’t start as a cybersecurity expert. The product manager for privacy and security at Google originally studied business and economics, before working in ecommerce and finance. When she takes the stage to keynote at SecTor 2017 this month, she’ll be drawing on her expertise in those fields to talk about how cybersecurity can […]

Read more
Beware Fake SecTor Scammers

PSA: Beware Fake SecTor Scams

One of the unfortunate side effects of building a successful conference is that it draws the scammers out of the woodwork. If someone contacts you and you can’t validate what they tell you by referring to the secured SecTor website at https://sector.ca/ then contact us to confirm the information. Our call out teams will only […]

Read more
Compromising Industrial Robots

Sabotage and Subterfuge: Hacking Industrial Robots

Isaac Asimov’s three laws of robotics are safe, sensible rules. First laid out in 1942, rule number one prevents a robot from harming a human being. The second forces it to obey orders given it by people, except where such orders would conflict with the first law. Finally, it must protect its own existence as […]

Read more
Where have all the grey hack BBSs gone?

Charting Hacker Hangouts From BBS To Slack

Where have all the grey hat hacker forums gone? Grey hats were always a valuable part of the hacker community. They may sometimes cross ethical lines, but unlike black hats they’re in it to learn, not to make money. A black hat might intend to steal credit cards and resell them online. A grey hat […]

Read more
Autism Could Help Bridge Cybersecurity Skills Gap

How Autism Could Help Bridge the Cybersecurity Skills Gap

Companies across north America are facing more cybersecurity pressures and can’t find the staff to help them. Now, a group of experts is exploring an overlooked segment of the population to help: those on the autism spectrum. The cybersecurity skills gap is growing, says Marian Merritt, lead for industry engagement at the National Initiative for […]

Read more
A look inside the phishing business

A Look Inside the Phishing Business

Times are good for online criminals. Phishing has been a problem for years, but thanks to the booming online criminal economy, it has never been easier or cheaper for black hats to harvest account details for financial and other web sites. A report from Israeli security firm ClearSky Cybersecurity shows that you can get a […]

Read more

Is It Time To Regulate the IoT?

US Senators just introduced new legislation to regulate the purchase of Internet of Things (IoT) devices. Why did they do it, and what chance is there of success? On August 1. the Internet of Things Cybersecurity Improvement Act would set minimum security requirements for federal procurements of connected devices. These include the ability to patch […]

Read more
Business Email Compromise

How To Fight Business Email Compromise

For years, email has been an ideal way for attackers to get into an organization. A decade ago, phishing was a simple way to harvest login details from consumers and employees alike. These days, the technique has evolved into a precision form of cybercrime that can deliver quick returns for online crooks. Welcome to the […]

Read more
Subscribe to the Sector Blog
Enter your contact information below to have future blog posts delivered directly to your inbox!