Effets inconscients de la désinformation

Les réseaux sociaux sont des moyens de communication très pertinents pour les humains. En effet, ils leur permettent d’échanger entre eux, de garder contact avec des connaissances éloignées, de se connecter avec des groupes d’intérêts similaires, de suivre l’actualité et plus encore. Cependant, il ne faut pas nier que les réseaux sociaux contiennent aussi des …

User Perceptions of Security Risks Related to Contact Tracing Technologies

Presented by Hervé Saint-Louis as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Researchers and industry have proposed cellphone-based contact tracing to help contain the spread of SARS-COV-2 virus in people during the Covid-19 pandemic. However, the efficacy of contact tracing requires a certain …

Taxonomie et définition du cyberterrorisme

Tous comme les cybercrimes, les cyberattaques à grande échelle sont en forte croissance et attirent autant l’attention des médias que des agences gouvernementales notamment parce que ces attaques sont souvent reliées à des menaces de cyberterrorisme. Une idée fausse est de tenir pour acquis que le cyberterrorisme est exactement le même phénomène que le terrorisme, …

Taxonomy and definition of cyberterrorism

Like cybercrime, large-scale cyber-attacks are overgrowing and attracting attention from both media and government agencies mainly because these attacks are often linked to threats of cyberterrorism. A misconception is to take for granted that cyberterrorism is precisely the same phenomenon as terrorism and then uses the exact definition for both phenomena. Moreover, even the definition …

Topological Data Analysis for Ransomware Detection on the Bitcoin Blockchain

Presented by Cuneyt Akcora as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity. About the presentation Proliferation of cryptocurrencies (e.g., Bitcoin) that allow pseudo-anonymous transactions, has made it easier for ransomware developers to demand ransom by encrypting sensitive user data. The recently revealed strikes of ransomware attacks …

Cybercrime and shifts in opportunities during COVID-19

The global pandemic in which we have been immersed for months has changed many things. Indeed, no one has been immune to periods of isolation, the risks of contagion from the virus, and unfortunately, the criminal opportunities that arose. Indeed, several waves of attempted fraud have made headlines in recent months. Fraudsters seem likely to …

Cybercriminalité et évolution des opportunités pendant la COVID-19

La pandémie mondiale dans laquelle nous baignons depuis des mois a bouleversé bien des choses. En effet, personne n’a été à l’abri des périodes d’isolements, des risques de contagion du virus, et malheureusement des opportunités criminelles qui en sont ressorties. En effet, plusieurs vagues de tentatives de fraudes ont fait les manchettes dans les derniers …

Multi-modal Fusion for Online Users Behavior Recognition

Presented by Sanjida Tumpa as a part of the 2020 Serene-risc Workshop on The State of Canadian Cybersecurity Conference: Human-Centric Cybersecurity About the presentation Identifying individuals based on their digital footprints has gain popularity in the field of ubiquitous biometric research. Users disclose unique behavioral trails on the Online Social Networking (OSN) platforms through their …

Privacy calculus on social networks?

Social networks on mobile applications are used more and more by everyone. Businesses and individuals use platforms like Twitter, Facebook, Instagram, WhatsApp, YouTube, and many others as sources of entertainment and income. However, the increase in use and public engagement on those platforms has also caused a significant increase in user privacy risks. Computers and …