Dr. Michele Mosca reminds us an unfortunate truth as laid bare by Max Planck “A new scientific truth does not triumph by convincing its opponents and making them see the light, but rather because its opponents eventually die, and a new generation grows up that is familiar with it.” Quantum Computing is an area …
Highly secure systems are often ‘Air Gapped’, or removed from any internet connected network to make it more difficult to illegally or maliciously access them. Attacks in recent years have shown that it is possible and perhaps not even particularly complex to have users load malicious software onto an air gapped computer (e.g. with a …
While threats that manifest in cyberspace are a national security imperative, they often manifest at a very local level. Digital connectivity is driving shifts in the policing landscape and new operating models are needed to confront the challenges of crimes enabled by the Internet. As a former Deputy Chief of Police with the Toronto …
Samantha Bates at Simon Fraser University has examined the emotional and mental health effects on survivors of revenge pornography. This form of non-consensual distribution of intimate images occurs after partners exchange intimate photos during a relationship, but when the relationship breaks down, one of the former partners distribute the images to the family, friends, employers …
Terrorism and the Internet is a hot button topic with the dangers posed by online groups being the subject of near constant debate and news headlines. A question that bears closer examination is the effect that the Internet has on would be terrorists. Does content or contact online cause a change in behaviour or does …
Timothy Rich at Western Kentucky University was interested to see if appeals in Advanced Fee Fraud emails for the recipient to trust them were effective at all. To do this he surveyed a large number of advanced fee fraud type emails to develop models of standard email text. These texts were then modified to include …
Good help is hard to find. The Internet is full of advice but it can be difficult to know what is good advice, and what is dangerous. This is true for advice around programming computer code as well. A group of researchers from Germany wanted to find out how much of an impact bad advice could …
RAND obtained a dataset of information about zero-day software exploits through a research connection. It is a rich dataset, as some of these exploits have been found by others and some have not. The dataset spans 14 years (2002–2016) and contains information about more than 200 zero-day exploits and the vulnerabilities that they take advantage …
A grand jury Northern District of California has indicted four defendants, including two officers of the Russian Federal Security Service (FSB), for computer hacking, economic espionage and other criminal offenses in connection with a conspiracy, beginning in January 2014, to access Yahoo’s network and the contents of webmail accounts. The defendants are Dmitry Aleksandrovich Dokuchaev, 33, …
Entrevue avec Sébastien Gambs dans le cadre de la conférence « La cybersécurité est-elle possible? » au Cœur des sciences de l’Université du Québec à Montréal (UQAM). Sébastien Gambs est professeur d’informatique à l’UQAM. Ses travaux de recherche portent principalement sur la protection de la vie privée et la sécurité informatique, en particulier pour les …