The online advertising market is becoming bigger and bigger. Users access content provided for free by publishers who monetize their audience through advertisement. Companies thus buy online exposure to promote their products, and in order to maximize advertisement efficiency, they tailor their ads to users regarding their interests. Advertisers use techniques such as cookies, local …
Le mois de mars est le mois de la prévention de la fraude et cela permet de rappeler que bien qu’Internet représente une opportunité majeure pour les transactions commerciales des entreprises et des particuliers, il offre également aux criminels la possibilité de cibler et d’attaquer des victimes dans le but de les arnaquer. Les escroqueries …
March is the Fraud Prevention Month and also a good time to remind people that even if Internet represent a major opportunity for corporate and individuals businesses transactions it also provides opportunities for criminals to target and attack victims in order to scam them. Internet scams aim to defraud victims with scammers applying different methods …
(English version below) Pour Noël, vous avez certainement planifié de vous acheter ou d’offrir un des nombreux assistants vocaux disponibles sur le marché. De plus en plus de gens achètent ce type d’appareil ainsi que des appareils intelligents pour des raisons de commodité et de sécurité. Les interactions informatiques activées par la voix sont intégrées …
Mobile devices such as smartphones and tablets are often referred as the ‘Swiss pocketknives’ of today’s individual, as they serve a range of needs, activities and purposes. Along with the rapid spread of smartphones, smartphone-based Social Networking Service (SNS) has penetrated into our daily lives by allowing people to maintain close and intimate relationships with …
Presented by David Fraser at The Atlantic Security Conference 2018. The new privacy breach notification law is coming into effect shortly and information security professionals are going to be on the front lines of breach investigation. David Fraser, recognized as one of the world’s top 30 data, privacy, cybersecurity lawyers, will provide a practical overview …
Luigi Logrippo at the Université du Québec en Outaouais presents the importance of multi-level access control methods for access control, data secrecy and data privacy. They suggest that an access control system that intends to provide secrecy and privacy must implement a multi-level access control method. In a system with data that is secret and …
Privacy, security and policies: A review of problems and solutions with semantic web technologies Sabrina Kirrane from The Vienna University of Economics, Serena Villata from Université Côte d’Azur, and Mathieu d’Acquin from the National University of Ireland Galway provide a look at how Semantic Web technologies research is progressing with relation to privacy and security concerns. They …
A common part of social networks is sharing images. Storing and processing these images to provide engaging services to customers is resource intensive and social networks often rely on cloud services to provide these resources. This creates a potential security risk for the users of the social network platform. Simply encrypting the images before uploading …
Presented at GoSec 2017 Jessica is an intelligence researcher/analyst with the Royal Canadian Mounted Police (RCMP). She has been with the Canadian Anti-Fraud Centre (CAFC) since 1998 and joined the Operational Support Unit in 2006. Jessica has previously been involved in most aspects of the CAFC disruption program. Along with providing tactical support to law …