Presented at the SERENE-RISC Workshop Spring 2016 The discussion of cybersecurity is highly complex and struggles with the ever increasing rate of sophisticated cyberattacks and digital exploitation. Cybersecurity continues to fall low in prioritization amongst executive management where there is a denial for a need of protection against such attacks. The discussion in today’s technological …
What do would you do if you misplaced your credit card? You are pretty sure it is in your other jacket, locked in the office for the weekend but you aren’t absolutely certain. Would you call the bank and cancel it immediately? The option of cancelling a security token when it is potentially jeopardized …
[ Le français suit ] SERENE-RISC Fall 2017 Workshop SERENE-RISC’s Workshops feature world-renowned experts and bring together Canadian and international cybersecurity policy-makers, practitioners and researchers from government, industry and academia. The Workshops enable evidence-based discussions on the nature of current and emerging threats, the challenges they pose to a diverse range of stakeholders, and what …
Presented at the SERENE-RISC Spring Workshop 2016. Fighting cybercrime and IT related crime has always been a question of cooperation, with the industry on one side mostly due to the needs of the investigators looking for trace evidence in networks, and with academia on the other side, when looking for appropriate training for law enforcement …
Apple Pay was launched more than 3 years ago to provide a “fast and secure” method of payment and quickly became very popular in the US. It was shortly followed by Android Pay which is also becoming popular. However, not everyone uses these systems despite their claimed security, convenience and speed. Jun Ho Huh, Saurabh …
Dr. Mashatan is currently a faculty member at the Ted Rogers School of Information Technology Management of Ryerson University where her research focus has been on Information Systems Security and Privacy. Prior to joining Ryerson University, she was a Senior Information Security Consultant and Solutions Architect at CIBC. Prior to that Dr. Mashatan was …
The Canadian Anti-Fraud Centre has released its latest bulletin on the subject of Text Messaging Scams, sometimes referred to as SMSishing. Find the English and French versions of the bulletin at the link below. 2017-09-15_Text_Messages_EN 2017-09-15_Text_Messages_FR “Text messaging scams occur when scammers use deceptive text messages to lure consumers into providing personal or financial …
Presented at the Spring 2016 SERENE-RISC Workshop. Assembly code analysis is one of the critical processes for mitigating the exponentially increasing threats from malicious software. It is also a common practice for detecting and justifying software plagiarism and software patent infringements when the source code is unavailable. However, it is a manually intensive and time-consuming …
Differential privacy (DP) provides a way to quantify privacy. A privacy budget quantitatively measures by how much the risk to an individual’s privacy may increase due to the inclusion of certain data. The higher the value, the less privacy protection is provided. This paper by Jun Tang, Aleksandra Korolova, Xiaolong Bai, Xueqiang Wang, and Xiaofeng Wang identifies the components …
Ben Buchanan looks at American Exceptionalism in the form of the NOBUS approach to signals intelligence in his contribution to the Hoover Institution’s Aegis Paper Series. There is a tension between the needs of nations in the information age to both secure and steal communications. The United States has traditionally met this by exploiting a …