Improving Cybersecurity Through Private Insurance?

While dealing with interconnected and global risks, the cyber-insurance market is intensely growing. This market is a creature of privacy and data security regulations, and mandatory breach notifications have shaped its business model. Market stakeholders suggest that cyber-insurance provides incentives and resources to insured organizations for improving cybersecurity. This presentation seeks to empirically test this …

Booting the booter

DoS (Denial of service) is an attack in which the perpetrator generates a large amount of traffic to overwhelm end-users or web service and prevent some or all legitimate requests from being fulfilled. Booter’ or ‘stresser’ services provide DoS attacks as-a-service. Booter operators can advertise their service and individuals can set up accounts and order …

Rotten Supplies – Supply Chain Attack Case Studies

We have seen an increase in supply chain attacks in the past few years. Some of these attacks have something in common: they involve a compromised Linux server to distribute malware or act as C&C server. This presentation will use real world case studies: the Transmission BitTorrent client distributing OSX/Keydnap; the M.E. Doc compromise responsible …

Digital Campaign Threats in Canada: Party Responses in an Age of Disinformation

This presentation reported on results from the examination of interference using disinformation through digital platforms. Its methods relied on media monitoring (both traditional media and social media) and interviews with party strategists. The aim was to detail the main instances of disinformation and other digital threats, and to analyze how each of the major parties …

Tester la conception de l’Internet des jouets

Les jouets connectés à Internet (IoToys) offrent aux enfants des possibilités de jeu, d’apprentissage et de soutien éducatif grâce à leurs fonctionnalités interactives et personnalisées. Les IoToys, comme tout autre appareil Internet des objets (IoT), contiennent des éléments électroniques et informatiques intégrés, tels que des microphones, des caméras, des capteurs de différents types, qui leur …

Testing Internet of Toys

Internet-connected toys (IoToys) offer children opportunities to play and learn, and also educational support thanks to their interactive and personalized features. IoToys, like any other Internet of Things (IoT) devices, contain embedded electronics and computing elements, such as microphones, cameras, sensors of various kinds, which enable them to interact with users and adapt to their …

Le système de mots de passe Game Changer : une nouvelle approche de la sécurité par mot de passe

De nos jours, la cybersécurité est aussi essentielle qu’omniprésente. Les utilisateurs finaux doivent être prêts et disposés à participer à la protection de leurs informations. Afin de s’assurer que les utilisateurs se conforment à la protection de leurs données, il est essentiel que les dispositifs mis en place soit faciles d’utilisation et de garder, par …